3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:01:55 executing program 4: unshare(0x40040000) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a\xc9n;v<\xd6h\xb0\x15\xaf;x\xb5;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd7\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$KDENABIO(r2, 0x4b36) 13:01:55 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0L\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:01:55 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x4}) [ 216.447602][T13397] overlayfs: failed to resolve './file1': -2 13:01:55 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 216.514435][T13411] IPVS: ftp: loaded support on port[0] = 21 [ 216.518201][T13417] QAT: Invalid ioctl [ 216.574622][T13514] QAT: Invalid ioctl 13:01:55 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x20005, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz1\x00', 0x1ff) add_key$user(&(0x7f0000005400)='user\x00', 0x0, &(0x7f0000005480)="45f42843e6d73a309b3ac18629e51d8f10e3201faad0f8814d466be4343648e652621194a09fd4affe80233e44c0f6dd9d10518d52213a896222385a4fac1210474032d3fcb4d2dc641e5ff6c8ee997774b8900e87b26c1174be0b023f259611b346b64bb62f241cd88d7034241d56544095286790c1518a3489535bb533169de66ca2f04b1992ad1db375046e7fce4ed4a213a017e8f5d2517ccd67701a", 0x9e, 0xfffffffffffffffd) pipe(&(0x7f0000000080)) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xc32, 0x86393f31c55fa2ea, 0x1, r1}) 13:01:55 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0h\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:01:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:01:56 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x5}) [ 216.813053][T13411] IPVS: ftp: loaded support on port[0] = 21 [ 216.848442][T13526] overlayfs: failed to resolve './file1': -2 13:01:56 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:01:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0l\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:01:56 executing program 4: unshare(0x40040000) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a\xc9n;v<\xd6h\xb0\x15\xaf;x\xb5;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd7\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000040)=0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000180)=[@in6={0xa, 0x4e21, 0x9, @ipv4={[], [], @local}, 0x27e}, @in6={0xa, 0x4e23, 0x10001, @remote}], 0x38) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000200)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000300)=0xe8) r4 = getgid() getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000440)=0xe8) write$P9_RSTATu(r1, &(0x7f0000000480)=ANY=[@ANYBLOB="b90000007d020000006f00810007000000200200000006000000000000000000211001000000b2e4b30b010000000100000013006367726f75706c6f626465766367726f75707b00001d00766d6e657430776c616e317b5d706f7369785f61636c5f6163636573730c002f6465762f617564696f230035005b6e6f64657624707070643573756d5d73797374656d6e6f646576656d3128766d6e65743176626f786e6574307070703029000000", @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5], 0xb9) 13:01:56 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x6}) [ 217.111236][T13546] overlayfs: failed to resolve './file1': -2 [ 217.134682][T13554] IPVS: ftp: loaded support on port[0] = 21 13:01:56 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:01:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0t\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:01:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0z\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 217.344270][T13671] overlayfs: conflicting lowerdir path 13:01:56 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x7}) 13:01:56 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:01:56 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:01:56 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400000, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @bt={0x5, 0xffffffffffff7fff, 0x8000, 0x100000000, 0x3ff, 0x401, 0x0, 0x2}}) r3 = shmget$private(0x0, 0x1000, 0x100, &(0x7f0000ffd000/0x1000)=nil) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000002c0)={{{@in6=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, 0xfffffffffffffffd) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getuid() stat(&(0x7f00000000c0)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getpgrp(0x0) r9 = getpgid(0x0) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000440)={{0x0, r4, r5, r6, r7, 0x80, 0x100000001}, 0x2, 0x7ff, 0x632780000000, 0x7fff, r8, r9}) 13:01:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x03\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:01:56 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0x8, &(0x7f0000000080)=0x2) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x1, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x3) [ 217.640728][T13688] overlayfs: conflicting lowerdir path 13:01:56 executing program 4: unshare(0x40040000) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a\xc9n;v<\xd6h\xb0\x15\xaf;x\xb5;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd7\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x15) ioctl$KDSKBLED(r1, 0x4b65, 0x7ff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000200)={{0x6, 0x5, 0x1, 0x3, '\x00', 0x7}, 0x2, 0x10000000, 0x0, r2, 0x2, 0x3, 'syz0\x00', &(0x7f0000000140)=['user', '\x99-userppp0\xb4ppp0selinuxcpuset\x00'], 0x21, [], [0x60a, 0x2, 0x80000001, 0x4]}) r3 = open(&(0x7f0000000040)='./file0\x00', 0x8002, 0x107a5ff1c9c75075) write$FUSE_NOTIFY_INVAL_ENTRY(r3, &(0x7f0000000080)={0x25, 0x3, 0x0, {0x5, 0x4, 0x0, 'user'}}, 0x25) [ 217.895683][T13812] IPVS: ftp: loaded support on port[0] = 21 13:01:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:01:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x06\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:01:57 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x500}) 13:01:57 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000000240)="0ab97f053b1f44d12679c8a648783164b6639243fd0d71cc702e918feb6983c8", 0x20) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x3) r3 = dup3(r2, r2, 0x80000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(r5, 0x84, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0xb) [ 218.083873][T13820] overlayfs: conflicting lowerdir path 13:01:57 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:01:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\a\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:01:57 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x600}) 13:01:57 executing program 4: unshare(0x40040000) r0 = syz_open_procfs(0x0, &(0x7f0000000440)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a\xc9n;v<\xd6h\xb0\x15\xaf;x\xb5;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd7\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f00000000c0)=0x3) 13:01:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00@\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 218.430133][T13950] overlayfs: conflicting lowerdir path 13:01:57 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:01:57 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x700}) 13:01:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040), 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:01:57 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x3) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) [ 218.593342][T13964] IPVS: ftp: loaded support on port[0] = 21 13:01:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00H\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 218.752724][T13972] overlayfs: conflicting lowerdir path 13:01:57 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) r2 = fcntl$dupfd(r0, 0x406, r0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) 13:01:58 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x4000}) 13:01:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00L\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:01:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) 13:01:58 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:01:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040), 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:01:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00h\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:01:58 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffff8, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x9000000) 13:01:58 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000080)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f0000000140)={r1, 0xffffffff, 0x10001, 0x8, 0x3, 0x8000, 0x7}) r2 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x3) write$UHID_INPUT2(r0, &(0x7f0000000200)={0xc, 0x4c, "5c7726aff1f76ce60f02ca22641b611a427c5b2924e6bc3770b979f5d561964d98746c857131d80fe53c594b7568ef4974aad787e28cea52884cefaa7dd740f52f620c9a8f71e8992da23e80"}, 0x52) 13:01:58 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000080)={0x0, 0x8}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000140)={r2, 0x285b}, &(0x7f0000000180)=0x8) r3 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x20, 0x740877fb69cd2cb5) setsockopt$TIPC_MCAST_REPLICAST(r3, 0x10f, 0x86) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000000)=0x3) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self\x00', 0x8400, 0x0) [ 219.363003][T14117] overlayfs: conflicting lowerdir path 13:01:58 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:01:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00l\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:01:58 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x1000000}) [ 219.554315][T14216] overlayfs: conflicting lowerdir path 13:01:58 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x8000, 0x0) getdents(r2, &(0x7f0000000200)=""/219, 0xdb) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) 13:01:58 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:01:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040), 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:01:58 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x2000000}) 13:01:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00t\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:01:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00z\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 219.818342][T14247] overlayfs: conflicting lowerdir path 13:01:59 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000180, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0x3bbaf5570fe57a97) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) ptrace$getsig(0x4202, 0x0, 0x1, 0x0) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 13:01:59 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400400, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) write$FUSE_STATFS(r1, &(0x7f0000000300)={0x60, 0x0, 0x6, {{0xfffffffffffffffa, 0xfffffffffffffff8, 0x100000000, 0x6, 0x200, 0x4, 0xa200000000000, 0x3}}}, 0x60) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000b40)="44acd087a250380596b8eebf03cd58550a146b5e45ad379dccace68e933b02c2", 0x20) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x3) r3 = msgget(0x0, 0x4) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000001280)=""/4096) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000080)) write$binfmt_aout(r2, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x6a5) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) open_by_handle_at(r0, &(0x7f0000000180)={0x35, 0x9, "8112e8c8c485e7c0d462b94c66cfba7b0433c173bbbf2a85d25b35dad5af08bc9aa09c45b410626e2bff3a009b"}, 0x100) perf_event_open(&(0x7f0000000200)={0x4, 0x70, 0xcd3, 0xfc60, 0x9, 0x1200000000000, 0x0, 0xa8, 0x50040, 0x0, 0x800, 0x7ff, 0xffffffff, 0x6, 0x2, 0x7, 0x1, 0x6, 0xfb49, 0xfffffffffffff801, 0x2, 0xe7f4, 0x3, 0x0, 0x5, 0xe9fc, 0x3ff, 0x80000001, 0x7ef, 0x400, 0xffffffff, 0xef, 0x9, 0x1, 0x5, 0x2, 0x8f8b, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x20, 0x40}, 0x10000, 0x1, 0x6, 0x7, 0x9, 0x738, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f00000008c0)=""/250, &(0x7f00000009c0)=0xfa) sendmmsg(r1, &(0x7f00000006c0)=[{{&(0x7f0000000280)=@sco={0x1f, {0x7fffffff, 0x1f, 0x100000001, 0x6, 0x40, 0x2}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000380)="3812dd9b2106fe299eaf16491458d4f11cac568fdfb2fc7290c90d95c9583e88720370dc060005bc9af26a7afee3dd28a5efecc2e93b201296927d48fc1325c8ae955e977eaf769dde04f67e2d242e0890dbe2c29339d0e520d17b34813298366d8b4ba1fcf660966ebde36c6102be98cda5d4f3016d336828336cd80bbd2497c1509b2fdbcc61c1de5a2fd991de61eaebdb5f58b754e862a6b4f1d0e35a1d1bdcf24a8100032f69bfde4830ad9dd17a57d6c0b39a97e1ad", 0xb8}, {&(0x7f0000000440)="4e6ecc310fb22d0e4d0ac64cd94eb21c27b37af84280110f7824b21665efbbe1ff1bc7c412c17f2127e37aeaff37eda34c1d75f65f76a3f53ecf0860fd489bbf6a41eb7b3a23553d02b9225347e401f0272f5e3c93757b61670546e75f3b5b150688a78e07fecb51fa63a037d6", 0x6d}, {&(0x7f00000004c0)="bb61378b1ec26a5c40acff9270d46e246e95c2", 0x13}, {&(0x7f0000000500)="dd1f7582f8008070defba70fe2f002cb75075cd80cad896e7307ede4f3419f5f84835bca21a9c740dcd60e7ab5a425443c9703372ab1e4bc4bac397e29f443190e48282896467405e6922b2d704c75498846a85540a4d0ff6ec84f3a421a32b84111537b65d7ed31f3a6902d180521167edcf1ea17bb4948b90f0ffa9f003473f4fb68dd4d745ce09de5336b9d0c037e69f359b79edc82c14d5440020cdb89aec126b05ce0af524e62bf5b33adc23a618587fed2bc84442715b302d91bac63ce12137b6b79d8974311d9b104f7660432a4818f8e0256e714a8ebc8b7949a789bcd0d62", 0xe3}, {&(0x7f0000002280)="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", 0x1000}, {&(0x7f0000000600)="68278d38476351fcec9ce021ad38a8639900155973b75572a89a5212521514f9b37df9d180c13608ad69301749", 0x2d}], 0x6, &(0x7f0000003280)=[{0x90, 0x10f, 0x4, "38695e4d2a7e738d56ec72b9ab7a60b97eef68bd65711aab0ed74b02f96a7845e1e4c20a916721d32a6d19aa19cd17d395f8bd6e267e7fb37dd8ba2a3c15bbb37f0b40cc8ac69ab58952e2c95111d83066a817285f3cc4d0720a96da3060a9d43f5a0cde7592c53e29d526db249822317cf93328ff39969aaa2691887de9"}, {0x1010, 0x10f, 0x4, "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"}, {0x1010, 0x10a, 0x6, "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"}, {0x28, 0x10f, 0x3, "54b1189e81de616acde5a5e01bb416ea2466bd"}, {0xb8, 0x1ff, 0xd3d2, "be3f898d87d504d3569f7aebf63b83e4a9c038a4862979677d8914da205018a6aa7a7b40d15c3cc59ba8bad0bd0481c4030a73ca8b0486cd3acdbd1b83f2a6040071d96fad7f83ec8fc61a07c098f16d8b9ce36f072da71d955aa6927b0e808fc0b50430b502673bdf930c3bf693cd6fcc4839905224dab607b1e134a768b9f679a6df5ed9fb09ba82957eea85348cebd1ffe7619847a9b2160adbf6441e30d2cc13602b"}, {0xd0, 0x6, 0xf76, "733633be4f53a9226f8e241cb8737309173c63d1b4a6244668d81da7e8b2141b0c004c5f6f204154b7e727330dc17261310eeb31a757b749ba8fa14addcc9b84dd434c09b13f0ad188ad89f2a9a328837319b7f477a501c54cb386c309ab52ae2ef02dab754ce98351b35ad09ca7b390b6c4d2c4c82eea4ea4df64133c8495e1ae0fe90edef28cedf941e78d95834c39f6cdee759c7013345e8abcdcb45b9c1d8e05c58977e5e5deaea3e97dcd031a685d884193483cff4f27c6a42309a2f8bd"}], 0x2260}}], 0x1, 0x4000) fgetxattr(r2, &(0x7f0000000a00)=@random={'security.', '/dev/ion\x00'}, &(0x7f0000000a40)=""/235, 0xeb) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000005580)={0x3, 0x7ff, 0x0, 0xf4, &(0x7f0000000700)=""/244, 0x97, &(0x7f0000000800)=""/151, 0x59, &(0x7f0000005500)=""/89}) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 13:01:59 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:01:59 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x3000000}) 13:01:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00$\x00', &(0x7f0000000040)=ANY=[]}) 13:01:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:01:59 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x20001, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f00000000c0)={0x9b0000, 0x45, 0xfff, [], &(0x7f0000000140)={0x9909cb, 0xfffffffffffeffff, [], @value=0x8000}}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) [ 220.204157][T14380] overlayfs: conflicting lowerdir path 13:01:59 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:01:59 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x4000000}) 13:01:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[]}) [ 220.317513][T14439] Unknown ioctl -1071622585 [ 220.362122][T14439] Unknown ioctl -1071622585 13:01:59 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x101, 0x400000) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000080)={0x9552, 0x3f, 0xbb, 0x2, 0x3}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) accept$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) sendmsg$nl_route(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="740000001d00000427bd7000fcdbdf2502000000", @ANYRES32=r3, @ANYBLOB="2000026e14000300000100000600000007000000ff0000001400010000000000000000000000ffffe000000208000900050000000c0002000180c20000000000140003000800000001000100b3044e470600000008000b00f507000096d08560d9015a0c192bf6fe565a552a03d6b01cd671ec3007eb60a1d9df0b194c7a8795392f4b89c3089949000af0d8f82b876ce29f89fa5af5f6a711485c3e4fdd490902f7b221948495315888f22ae2b22a14ff2f3368907cdd93121528bf8c4061009d9d7f1a18865c3b55b83347850e1d187302b1b8fdff7a0c01407d1613e6819ba56ecac90bbe68d480636b8d3b351d402e6eaf980811d33837488a721538b6af204db80dac1c501b8b950bcf4b17c5bac1221b9a"], 0x74}, 0x1, 0x0, 0x0, 0x800}, 0x4080) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000000)) ioctl$VIDIOC_ENUMSTD(r1, 0xc0485619, &(0x7f00000000c0)={0x6, 0x0, "c8c63965791ae06c7fddb79d02af8b05637f0e79558e0e77", {0x3, 0x3}, 0x200}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000200)=0x1) [ 220.452352][T14504] overlayfs: conflicting lowerdir path 13:01:59 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:01:59 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{r0, r1/1000+30000}}, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 13:01:59 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x5000000}) 13:01:59 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:01:59 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x40200, 0x0) setsockopt$netrom_NETROM_T4(r2, 0x103, 0x6, &(0x7f00000002c0)=0x401, 0x30f) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x6e, 0xdb9bee26ee6ee03b) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) 13:01:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x02\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:01:59 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x4000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000080)={{0x0, 0x3, 0x3, 0x0, 0x8000}}) 13:02:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x03\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:00 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x6000000}) 13:02:00 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:00 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x80, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000000380)={0x28, 0x2, 0x0, {0x4, 0x40, 0x1}}, 0x28) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x40000, 0x0) sendmsg$nl_crypto(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=@alg={0x110, 0x10, 0x20, 0x70bd2d, 0x25dfdbfc, {{'ecb(cipher_null)\x00'}, [], [], 0x2000, 0x2400}, [{0x8, 0x1, 0x8001}, {0x8, 0x1, 0x1c00000000}, {0x8}, {0x8, 0x1, 0x3}, {0x8, 0x1, 0x7}, {0x8, 0x1, 0x3}]}, 0x110}}, 0x40080) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000040)=0x1) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x3) 13:02:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0xffffffffffffffff, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:02:00 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{r0, r1/1000+30000}}, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 13:02:00 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x7000000}) 13:02:00 executing program 2: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8, 0x20800) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x2000, 0x0) ioctl$KVM_CHECK_EXTENSION(r0, 0xae03, 0x1f) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000140)) 13:02:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x04\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 221.248362][T14655] overlayfs: conflicting lowerdir path 13:02:00 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:00 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{r0, r1/1000+30000}}, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 13:02:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:02:00 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="2321202e2f66696c6530206b657972586e6726235d626465760abec6d54148a546da52fd34aeef53cf61c085864bd3917689096f48fc01dad4d242e3c3ca2d1048cf42128a66ca70e50dc996583cae3a842ef4ce8559dcc8fb49cac4c8497d76398831691d1ed0e2ee732cced8be22da71a0a6bf7d1ed212489210b805b395e123548c57"], 0x84) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) 13:02:00 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x40000000}) 13:02:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x05\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:00 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) r2 = add_key(&(0x7f00000000c0)='pkcs7_test\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000200)="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", 0xfb, 0xfffffffffffffff8) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, 0x0, 0x0, r2) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x1) 13:02:00 executing program 4: ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) utimensat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)={{r0, r1/1000+30000}}, 0x0) ioctl$TCGETA(0xffffffffffffffff, 0x5405, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 13:02:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x06\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 221.761840][T14794] overlayfs: workdir and upperdir must reside under the same mount 13:02:01 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0xfdfdffff}) 13:02:01 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:01 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000140)={{}, 'syz0\x00', 0x7ffffe}) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$RFKILL_IOCTL_NOINPUT(r1, 0x5201) 13:02:01 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ion\x00', 0x8000, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) 13:02:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\a\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 222.053547][T14922] input input7: cannot allocate more than FF_MAX_EFFECTS effects 13:02:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:02:01 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000540)='/dev/snd/pcmC#D#p\x00', 0x7, 0x4000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000140)=0x8) write$nbd(r0, &(0x7f0000000400)={0x67446698, 0x1, 0x1, 0x3, 0x3, "36aa1d031acd606afd02233c3c5008d93aba093798033ef5884ddf48b6459ba03a1d5e867ef25bdcba38b9485bf0a210f776aa6b0632cb721e14c001563e03dd9fe96df08efdfca5743488d3ebfd8e23fc19455f1f01129a3e4e8ff5ea7acb430ed85fc347713b3f94a877cedf5f26309ec82a7e20af977a38221503071991bc05cb84ff7ff1cf68d37b5d971b21c8c5bc653c68f25513d3c043ae"}, 0xab) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x100000000, 0x800) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f00000003c0)={0x5, 0x6}) r3 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f0000000100)={0xa929, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, &(0x7f0000000000)=0x3) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f0000000340)='y\x00', 0x2, 0x3) ioctl$KVM_GET_SREGS(r5, 0x8138ae83, &(0x7f0000000200)) 13:02:01 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r1, r2, 0x0, 0x8001) recvmsg(r0, &(0x7f0000000100)={&(0x7f0000000080)=@nfc, 0x80, &(0x7f0000000000)=[{&(0x7f0000000180)=""/141, 0x8d}], 0x1}, 0x0) 13:02:01 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0xfffffdfd}) 13:02:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00H\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:01 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='configfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000080)=""/212, 0x42) 13:02:01 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000040)={0x3, 0x14, 0x1, r1}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) 13:02:01 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:01 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x100000000000000}) 13:02:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00L\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:02:01 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000080)=0x7) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x1, 0x0) timerfd_gettime(r2, &(0x7f0000000040)) [ 222.779312][T15073] overlayfs: workdir and upperdir must reside under the same mount [ 222.842605][T15090] ptrace attach of "/root/syz-executor.4"[15089] was attempted by "/root/syz-executor.4"[15090] 13:02:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:02:02 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x200000000000000}) 13:02:02 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ion\x00', 0x30080, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x2) 13:02:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00h\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:02 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:02 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000040)=0x3) r2 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffffffffffe0, 0x20000) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000080)={0x79, 0x0, [0x14107b7a, 0x100, 0x0, 0x8000]}) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000140)=0x9) arch_prctl$ARCH_GET_CPUID(0x1011) 13:02:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00l\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 223.046569][T15102] overlayfs: conflicting lowerdir path 13:02:02 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:02 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x300000000000000}) 13:02:02 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29}) 13:02:02 executing program 4: 13:02:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00t\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 223.456562][T15221] overlayfs: workdir and upperdir must reside under the same mount 13:02:02 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:02:02 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x400000000000000}) 13:02:02 executing program 4: 13:02:02 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) 13:02:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00z\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:02 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:02 executing program 4: 13:02:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x03\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:02 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) r1 = dup(r0) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000040)={0x800, 0x9}) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000140)=0xc) ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000180)={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, r3}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x3) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000080)) sendto(r1, &(0x7f0000000200)="57514c7def42b53dce347bc903b421b858794b9c0802c257f1d62f28de0c90812c68748f23fb6c10fa2fc677a2845f7e469e84816199530d3ec2bd98c40379cb3f7980f17ffed31b1b168fafe32f31573f0df7052f821a549b465342e5f245f3b6e7fe8c0a54e92a7687ca1a99", 0x6d, 0x4004004, 0x0, 0x0) 13:02:02 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x500000000000000}) 13:02:03 executing program 4: [ 223.852676][T15256] overlayfs: workdir and upperdir must reside under the same mount 13:02:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x05\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:03 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:02:03 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read'}}, {@blksize={'blksize', 0x3d, 0x200}}]}}) 13:02:03 executing program 2: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) ioctl$BLKROSET(r0, 0x125d, &(0x7f00000000c0)=0x7) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f0000000140)={0x3ff}) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x4000) ioctl$KVM_GET_MP_STATE(r0, 0x8004ae98, &(0x7f0000000180)) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0xe11, 0xa3, 0x0, 0xd99, 0x6, 0x9, 0x0, 0x4, 0x3, 0x100, 0x7, 0x1f, 0x0, 0x10000006, 0xfff], 0x1000, 0x800}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x3) 13:02:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x06\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:03 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x600000000000000}) [ 224.264839][T15394] fuse: Bad value for 'subtype' [ 224.270956][T15391] overlayfs: conflicting lowerdir path [ 224.284123][T15401] fuse: Bad value for 'subtype' 13:02:03 executing program 4: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x9d, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x75, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60d8652b00140400fe8000000000000000000000000000aafe8000000000000000000000000000aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="d000eb155a5f0000"], 0x0) 13:02:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\a\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:03 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:03 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x700000000000000}) 13:02:03 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x40000, 0x0) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000140)) ioctl$SIOCAX25ADDUID(r2, 0x89e1, &(0x7f0000000180)={0x3, @null, r3}) [ 224.515121][T15504] overlayfs: conflicting lowerdir path 13:02:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00@\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:03 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc, 0x0, 0x63}) 13:02:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(0x0, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:02:03 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:03 executing program 4: r0 = socket(0x10, 0x802, 0x0) sendmsg$nl_route(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB="280000001e00030300"/20, @ANYRES32=0x0, @ANYBLOB="00000001000008010e00000000000000"], 0x28}}, 0x0) 13:02:03 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x7b31a24f18554a44, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) timer_create(0x3, 0x0, &(0x7f0000000040)) exit(0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f00000002c0)={0x0, @in6={{0xa, 0x4e23, 0xffff, @rand_addr="d43552b500e5c7532a3dd3d43df8f268", 0x80000000000000}}, 0x10001, 0x4f5e, 0x1, 0xcc49, 0xffffffff}, &(0x7f0000000380)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f00000003c0)={r3, 0x8}, &(0x7f0000000400)=0x8) timer_settime(0x0, 0x0, &(0x7f0000000100), 0x0) r4 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000180)="bcb0e5ff503824419b43d6074fca30abad64b317", 0x14, 0xfffffffffffffff8) r5 = request_key(&(0x7f0000000200)='ceph\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f0000000280)='/dev/ion\x00', 0xfffffffffffffffa) keyctl$link(0x8, r4, r5) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000140)=0x15) 13:02:03 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x4000000000000000}) [ 224.818003][T15547] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 13:02:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00H\b\x00', &(0x7f0000000040)=ANY=[]}) [ 224.864843][T15538] overlayfs: conflicting lowerdir path 13:02:04 executing program 4: mlock2(&(0x7f0000840000/0x2000)=nil, 0x2000, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, &(0x7f0000000000), 0x0, 0x0) munlockall() 13:02:04 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:04 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0xfdfdffff00000000}) 13:02:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00L\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 13:02:04 executing program 4: clock_adjtime(0x9f0744ae83e98527, &(0x7f0000000100)) 13:02:04 executing program 0: r0 = socket$bt_cmtp(0x1f, 0x3, 0x5) r1 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0xd71369349c1b52b2, 0x48) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000300)=@mangle={'mangle\x00', 0x1f, 0x6, 0x520, 0x0, 0x0, 0xf0, 0x0, 0x2e8, 0x488, 0x488, 0x488, 0x488, 0x488, 0x6, &(0x7f0000000280), {[{{@ip={@remote, @rand_addr=0x1d5e, 0x43936c6beabe432b, 0xff, 'ip_vti0\x00', 'irlan0\x00', {0xff}, {0xff}, 0x17, 0x1, 0x18}, 0x0, 0xc8, 0xf0, 0x0, {}, [@common=@ah={0x30, 'ah\x00', 0x0, {0x5, 0x2b967bd0, 0x1}}]}, @TTL={0x28, 'TTL\x00', 0x0, {0x1, 0x8}}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@common=@ttl={0x28, 'ttl\x00', 0x0, {0x3, 0x6}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xbde647b633b70a5d}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ip={@local, @empty, 0xff000000, 0xff000000, 'tunl0\x00', 'tunl0\x00', {}, {}, 0x1d, 0x2, 0x8}, 0x0, 0xb8, 0xe0, 0x0, {}, [@common=@socket0={0x20, 'socket\x00'}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0x98, 0xc0}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0x20, 0x4}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x580) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000040)={{0x3c2, 0x4, 0xaee, 0x2, 0xfffffffffffffff7, 0x9}, 0x1}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x200, 0x0) r3 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$CAPI_GET_SERIAL(r4, 0xc0044308, &(0x7f0000000000)=0x38) perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0xb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r4, 0x50009405, &(0x7f00000000c0)) [ 225.214289][T15664] overlayfs: workdir and upperdir must reside under the same mount 13:02:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e776) fchdir(0xffffffffffffffff) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000003c0)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000340)=0x1, 0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000000c0)) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000100)='TIPCv2\x00') r3 = gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000500), &(0x7f0000000600)=ANY=[@ANYBLOB="656e633d6f616861736806000000000000004da5ea6362636d6c632d6165732d6b65000000010000000000000000000000000000000000000000000000000000200000000000000000000000200000000000000000f7a86bc100aa06b945f40d6b4d070badf7115e12f6a5e54bf2600d134f90f0f980212efdc2988869eb9e04b9819b72a884bdec27e1f4436d0ee0ffffffff"], 0x0, 0x0) ptrace(0x10, r3) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000000)) wait4(0x0, 0x0, 0x2, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000bc0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB="050029bd7000fbdbdf250a0000205400010038000400200001000a004e2400010001d636018db5df44bcf899873f7433b386d10900001400020002004e21ac1e0101000000000000000008000300090000001000010069623a6c61706230000000007417d16bb64511e70800020080000000080001001d0000000800040049c1000010db07000c004300837700111500000079c206f609f796c74d597ca1f78a16914ca51cc592dc022915bdade6d5e0ddeadf32a8c7b31a9bccbc4ac586e236d751368ac5f3edbe4d3f0aec78f59da4b60d0c589e70e435ba5b7c7034a053f6f1f224d5fe8ae9b91972af2f2fb4b15a5690805882661f8c60bf4526f50191a338337aac156a4993cb797b077f2de7e760ebe9773fe2de3057b6520ff23c1fe2e6a0bb4863392bf2f7ae6622533142d7e45c3e8951ab0fcdd36f14c32d93b7390892cc9b05570c171c093e0fcabaedc004b5248b8b157297fb639c9f6a2a08cf0b5553bcfb20b8d2eba0ef959e07f668134470ca0357d19c66bfc52b28296ed695daed3e8e7b3429425865e1486ae8184558833fae8621f27abbbf9a32c7375ef3c0fcdad2a1b68ef2f8923e832b3c3fd46c7fdd510c38ccce307f48a4155c9b5b5c5424ebec26"], 0x1}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) creat(&(0x7f0000000480)='./bus\x00', 0x0) 13:02:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00h\b\x00', &(0x7f0000000040)=ANY=[]}) [ 225.520279][T15795] IPVS: ftp: loaded support on port[0] = 21 [ 225.542660][T15796] ptrace attach of "/root/syz-executor.4"[15795] was attempted by "/root/syz-executor.4"[15796] 13:02:04 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ion\x00', 0x405, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa928, 0x1002d, 0x1, r1}) ioctl$sock_inet6_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000080)) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f0000000000)=0x3) setsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f00000000c0)=0x1, 0x4) 13:02:04 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:04 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) 13:02:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00l\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 13:02:04 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e776) fchdir(0xffffffffffffffff) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000003c0)) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f0000000340)=0x1, 0x4) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet6_tcp_SIOCATMARK(r2, 0x8905, &(0x7f00000000c0)) ioctl$ASHMEM_SET_NAME(r2, 0x41007701, &(0x7f0000000100)='TIPCv2\x00') r3 = gettid() clone(0x40000000, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_RESET_LINK_STATS(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(0xffffffffffffffff, 0x891a, 0x0) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f0000000500), &(0x7f0000000600)=ANY=[@ANYBLOB="656e633d6f616861736806000000000000004da5ea6362636d6c632d6165732d6b65000000010000000000000000000000000000000000000000000000000000200000000000000000000000200000000000000000f7a86bc100aa06b945f40d6b4d070badf7115e12f6a5e54bf2600d134f90f0f980212efdc2988869eb9e04b9819b72a884bdec27e1f4436d0ee0ffffffff"], 0x0, 0x0) ptrace(0x10, r3) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f0000000000)) wait4(0x0, 0x0, 0x2, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000bc0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4000080}, 0x4000) creat(&(0x7f0000000480)='./bus\x00', 0x0) [ 225.701335][T15813] overlayfs: conflicting lowerdir path 13:02:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00t\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:04 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:04 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x8}) ioctl$KVM_GET_XSAVE(r0, 0x9000aea4, &(0x7f00000001c0)) 13:02:05 executing program 2: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x400, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'bpq0\x00', 0x2}) r1 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29}) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f00000000c0)=0x14) 13:02:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00z\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000180)=ANY=[@ANYBLOB="01000000000000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000a004e2000000000fe880000000000000004000000000100010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004c4752ad1f1b84cc7b81c125000000000000000100000000000000000000000a004e2100000003fe88000000ffffffec0000365fd0c93100000000010000000000000000000000000200000000000000000000001c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000389ede788cde529313d1cd2ae0003018000000000000000000000000000000000000000000cd7671f800000000000a004e210000007ffe8000000000000000000000000000bb01000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000a004e2300000006fe80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006e63c91a0000000000000000000000000000000000000000000000000e0000000000000000000000000000000000000000000000000000000a00000000000000ff01000000000000000000000000000100"/799], 0x310) setsockopt$inet6_group_source_req(r1, 0x29, 0x2b, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @local}}}, 0x108) [ 226.022944][T15935] overlayfs: workdir and upperdir must reside under the same mount [ 226.033230][T15923] IPVS: ftp: loaded support on port[0] = 21 13:02:05 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:05 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 13:02:05 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x18) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) fdatasync(r1) ioctl$KVM_HAS_DEVICE_ATTR(r0, 0x4018aee3, &(0x7f00000001c0)={0x0, 0xff, 0xfffffffffffffffa, &(0x7f0000000100)=0x3}) mlockall(0x1) 13:02:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x02\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:05 executing program 2: setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x0) memfd_create(0x0, 0x0) r0 = memfd_create(0x0, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='task\x00') pipe(&(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) ioctl$RTC_ALM_READ(0xffffffffffffffff, 0x80247008, &(0x7f0000000300)) ioctl$TIOCGISO7816(0xffffffffffffffff, 0x80285442, &(0x7f0000000340)) ioctl$LOOP_SET_FD(r2, 0x4c00, 0xffffffffffffffff) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000180), 0x4) r3 = inotify_init() splice(0xffffffffffffffff, &(0x7f0000000380), 0xffffffffffffffff, &(0x7f0000000540), 0x0, 0x0) getrusage(0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x4) sendmsg$TIPC_NL_PUBL_GET(r1, 0x0, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e21, 0x1, @empty, 0x9}, 0x1c) inotify_add_watch(r3, &(0x7f0000000080)='.\x00', 0xfe) read(0xffffffffffffffff, &(0x7f00000007c0)=""/177, 0x24c) r4 = open(&(0x7f0000000400)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r4, &(0x7f0000000280)=ANY=[@ANYRESDEC], 0x14) sendfile(r4, r4, &(0x7f00000001c0), 0xa198) io_cancel(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xf, 0x6, r0, &(0x7f00000017c0)="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", 0xffc, 0x10001}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 226.393783][T15962] overlayfs: workdir and upperdir must reside under the same mount 13:02:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x104) 13:02:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x03\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:05 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:05 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9cfe) unlink(&(0x7f00000000c0)='./file0\x00') creat(&(0x7f0000000100)='./file1\x00', 0x0) clone(0x1000108, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file1\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', 0x0, 0x135, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x7) open(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) [ 226.721296][T16081] overlayfs: workdir and upperdir must reside under the same mount 13:02:05 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) 13:02:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x04\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:06 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x05\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:06 executing program 1: [ 227.178933][T16204] overlayfs: workdir and upperdir must reside under the same mount 13:02:06 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000400)='/dev/btrfs-control\x00', 0x266182, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r0, 0xc0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=0x2, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x5, 0x5}, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x6, 0x47824b35, 0x3f}, &(0x7f00000001c0), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x7fff}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000340)=r1, 0x4) 13:02:06 executing program 4: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) 13:02:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x06\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:06 executing program 1: 13:02:06 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:06 executing program 2: 13:02:06 executing program 2: 13:02:06 executing program 1: [ 227.410510][T16223] overlayfs: conflicting lowerdir path 13:02:06 executing program 2: 13:02:06 executing program 1: 13:02:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\a\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:06 executing program 4: 13:02:06 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) fremovexattr(r0, &(0x7f0000000080)=@known='trusted.overlay.opaque\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) ioctl$sock_bt_cmtp_CMTPCONNDEL(r0, 0x400443c9, &(0x7f0000000000)={{0x81, 0x40, 0x20, 0x40, 0x76f0d9ae, 0x5fa4}, 0x6}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000100)={0x8, 0x1}) 13:02:06 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:06 executing program 4: 13:02:06 executing program 2: 13:02:06 executing program 1: 13:02:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00H\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:06 executing program 4: 13:02:07 executing program 2: [ 227.868948][T16256] overlayfs: workdir and upperdir must reside under the same mount 13:02:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:07 executing program 1: 13:02:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00L\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:07 executing program 4: 13:02:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'U-', 0x9}, 0x28, 0x1) 13:02:07 executing program 2: 13:02:07 executing program 4: [ 228.101664][T16277] overlayfs: conflicting lowerdir path 13:02:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00h\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:07 executing program 1: 13:02:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:07 executing program 2: 13:02:07 executing program 4: 13:02:07 executing program 2: 13:02:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00l\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:07 executing program 4: 13:02:07 executing program 1: 13:02:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6b, 0x6b, 0x3, [@enum={0xf, 0x7, 0x0, 0x6, 0x4, [{0xd, 0x8}, {0x9}, {0x8, 0x400}, {0x4, 0xfffffffffffffffd}, {0x2, 0x40}, {0x9, 0x100000000}, {0x1, 0x9}]}, @typedef={0x2, 0x0, 0x0, 0x8, 0x3}, @typedef={0x6, 0x0, 0x0, 0x8, 0x2}, @datasec={0x10, 0x0, 0x0, 0xf, 0x3, [], "0418d3"}]}, {0x0, [0x2e]}}, &(0x7f0000000280)=""/213, 0x87, 0xd5, 0x1}, 0x20) [ 228.482904][T16305] overlayfs: conflicting lowerdir path 13:02:07 executing program 2: 13:02:07 executing program 4: clone(0x8000100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x1840, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000040)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r0, r1) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK/file0\x00', 0x0, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) 13:02:07 executing program 1: 13:02:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00t\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:07 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGIDLE(r0, 0x8010743f, &(0x7f0000000000)) splice(r1, &(0x7f0000000080), r1, &(0x7f0000000100), 0x80000001, 0x8) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:07 executing program 2: 13:02:07 executing program 1: 13:02:08 executing program 4: 13:02:08 executing program 1: [ 228.882143][T16332] overlayfs: workdir and upperdir must reside under the same mount 13:02:08 executing program 2: 13:02:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00z\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:08 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:08 executing program 1: 13:02:08 executing program 2: 13:02:08 executing program 4: 13:02:08 executing program 1: 13:02:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00$\x00', &(0x7f0000000040)=ANY=[]}) 13:02:08 executing program 4: 13:02:08 executing program 2: [ 229.295717][T16373] overlayfs: conflicting lowerdir path 13:02:08 executing program 1: 13:02:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:08 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:08 executing program 4: 13:02:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[]}) 13:02:08 executing program 4: 13:02:08 executing program 2: 13:02:08 executing program 1: 13:02:08 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000000)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000080)={r1, 0x10}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:08 executing program 1: 13:02:08 executing program 4: 13:02:08 executing program 2: [ 229.711733][T16399] overlayfs: workdir and upperdir must reside under the same mount 13:02:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00$\x00', &(0x7f0000000040)=ANY=[]}) 13:02:08 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:09 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000080), &(0x7f0000000100)) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:09 executing program 1: 13:02:09 executing program 4: 13:02:09 executing program 2: [ 229.960528][T16428] overlayfs: conflicting lowerdir path 13:02:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x02\x00', &(0x7f0000000040)=ANY=[]}) 13:02:09 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:09 executing program 1: 13:02:09 executing program 2: 13:02:09 executing program 4: 13:02:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x03\x00', &(0x7f0000000040)=ANY=[]}) 13:02:09 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000080)={0x6, 0x1}) 13:02:09 executing program 2: [ 230.224885][T16451] overlayfs: conflicting lowerdir path 13:02:09 executing program 1: 13:02:09 executing program 4: 13:02:09 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:09 executing program 2: 13:02:09 executing program 1: 13:02:09 executing program 4: 13:02:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x04\x00', &(0x7f0000000040)=ANY=[]}) 13:02:09 executing program 1: 13:02:09 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0xea6d, 0x3}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000280)={&(0x7f0000000100)=[0x0], &(0x7f00000001c0)=[0x0, 0x0], &(0x7f0000000200)=[0x0, 0x0], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x1, 0x2, 0x2, 0x7}) 13:02:09 executing program 2: 13:02:09 executing program 4: 13:02:09 executing program 4: [ 230.671097][T16479] overlayfs: conflicting lowerdir path 13:02:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x05\x00', &(0x7f0000000040)=ANY=[]}) 13:02:09 executing program 2: 13:02:09 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:09 executing program 4: 13:02:09 executing program 1: 13:02:10 executing program 2: 13:02:10 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000240)=""/82) r1 = geteuid() ioctl$SIOCAX25GETUID(r0, 0x89e0, &(0x7f0000000000)={0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, r1}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x4, 0x70, 0x7, 0x8, 0x1000, 0x5, 0x0, 0x1, 0x80000, 0x5, 0x7fff, 0x2, 0x3, 0x8, 0xfffffffffffff79b, 0x401, 0x3, 0xfff, 0x2, 0x100000001, 0x9, 0x2, 0x3f, 0x8001, 0x9, 0x4, 0x0, 0xc58e, 0x6, 0x4, 0x4, 0x2, 0x8, 0x9, 0x8, 0x1, 0x9, 0x101, 0x0, 0xcad7, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x10, 0xc1b0, 0x74ffe813, 0xf, 0x101, 0x4, 0x2}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:10 executing program 1: 13:02:10 executing program 4: 13:02:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x06\x00', &(0x7f0000000040)=ANY=[]}) [ 231.030905][T16510] overlayfs: conflicting lowerdir path 13:02:10 executing program 2: 13:02:10 executing program 4: 13:02:10 executing program 1: 13:02:10 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:10 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000080)={0x0, 0xfffffffffffffffc}) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000000)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) 13:02:10 executing program 2: 13:02:10 executing program 1: 13:02:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\a\x00', &(0x7f0000000040)=ANY=[]}) 13:02:10 executing program 4: 13:02:10 executing program 2: 13:02:10 executing program 1: 13:02:10 executing program 4: 13:02:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\bH\x00', &(0x7f0000000040)=ANY=[]}) 13:02:10 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000001c0)=""/184) getsockname$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f0000000080)=0x1c) 13:02:10 executing program 1: [ 231.562838][T16545] overlayfs: workdir and upperdir must reside under the same mount 13:02:10 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:10 executing program 2: 13:02:10 executing program 4: 13:02:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\bL\x00', &(0x7f0000000040)=ANY=[]}) 13:02:10 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x12) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000140)={0x1, {{0x2, 0x4e20, @local}}, 0x0, 0x2, [{{0x2, 0x4e20, @remote}}, {{0x2, 0x4e22, @remote}}]}, 0x190) 13:02:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={[{@uni_xlate='uni_xlate=1'}]}) 13:02:10 executing program 4: pipe(&(0x7f00000006c0)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x5f, 0x0) fallocate(0xffffffffffffffff, 0x6, 0x11b, 0x800) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000080)=0x81) r2 = socket$inet(0x2, 0x4000000000000801, 0x0) capset(&(0x7f00000fc000)={0x19980330}, &(0x7f0000000280)={0xa04, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}) sendto$inet(r2, 0x0, 0x0, 0x200007ff, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000c00)=""/253) sendto$inet(r2, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001240)={0x0, 0x0}) recvmmsg(r2, &(0x7f0000002940)=[{{&(0x7f00000011c0)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f0000002380)=""/133, 0x85}], 0x1, &(0x7f0000001280)=""/112, 0x70}}, {{0x0, 0x0, &(0x7f0000002840), 0x0, &(0x7f00000028c0)=""/87, 0xffffffffffffff4f}}], 0x45483d5a560d7693, 0x0, &(0x7f0000002a80)={0x0, r3+30000000}) 13:02:10 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x8, 0x4) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) [ 231.944084][T16583] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) [ 231.957502][T16573] overlayfs: workdir and upperdir must reside under the same mount 13:02:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000003440)='net/mcfilter\x00') readv(r0, &(0x7f0000000180)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1) 13:02:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\bh\x00', &(0x7f0000000040)=ANY=[]}) 13:02:11 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 232.012371][T16586] FAT-fs (loop1): bogus number of reserved sectors [ 232.077120][T16586] FAT-fs (loop1): Can't find a valid FAT filesystem 13:02:11 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) fadvise64(r0, 0x0, 0x8, 0x2) 13:02:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\bl\x00', &(0x7f0000000040)=ANY=[]}) 13:02:11 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 232.255818][T16608] overlayfs: conflicting lowerdir path 13:02:11 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x100000000000000}) 13:02:11 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:11 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:11 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$PPPIOCSFLAGS(r0, 0x40047459, &(0x7f0000000000)=0x22) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000080)={0x1f4f, 0x1}) fstat(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f00000002c0)={0xa0, 0x19, 0x1, {0x0, {0x0, 0x0, 0x3}, 0x2, r1, r2, 0x7, 0x80000001, 0x20e2a761, 0xcb9d, 0x7, 0xfffffffffffff672, 0xff, 0xb23b, 0x8, 0x6, 0x4, 0x7ff, 0x9, 0x3e5684b2, 0x3}}, 0xa0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\bt\x00', &(0x7f0000000040)=ANY=[]}) [ 232.483377][T16727] overlayfs: conflicting lowerdir path 13:02:11 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 232.535378][T16732] overlayfs: conflicting lowerdir path 13:02:11 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:11 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) fsetxattr$security_smack_transmute(r0, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x1) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:11 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x20005, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz1\x00', 0x1ff) add_key$user(&(0x7f0000005400)='user\x00', 0x0, &(0x7f0000005480)="45f42843e6d73a309b3ac18629e51d8f10e3201faad0f8814d466be4343648e652621194a09fd4affe80233e44c0f6dd9d10518d52213a896222385a4fac1210474032d3fcb4d2dc641e5ff6c8ee997774b8900e87b26c1174be0b023f259611b346b64bb62f241cd88d7034241d56544095286790c1518a3489535bb533169de66ca2f04b1992ad1db375046e7fce4ed4a213a017e8f5d2517ccd67701a", 0x9e, 0xfffffffffffffffd) pipe(&(0x7f0000000080)) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xc32, 0x86393f31c55fa2ea, 0x1, r1}) [ 232.680968][T16744] overlayfs: conflicting lowerdir path [ 232.689990][T16740] overlayfs: workdir and upperdir must reside under the same mount 13:02:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\bz\x00', &(0x7f0000000040)=ANY=[]}) 13:02:11 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:11 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 232.866205][T16753] overlayfs: conflicting lowerdir path 13:02:12 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'rose0\x00', 0x8000}) 13:02:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x03\x00', &(0x7f0000000040)=ANY=[]}) 13:02:12 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 233.033099][T16767] overlayfs: conflicting lowerdir path [ 233.110747][T16769] overlayfs: workdir and upperdir must reside under the same mount 13:02:12 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x20005, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz1\x00', 0x1ff) add_key$user(&(0x7f0000005400)='user\x00', 0x0, &(0x7f0000005480)="45f42843e6d73a309b3ac18629e51d8f10e3201faad0f8814d466be4343648e652621194a09fd4affe80233e44c0f6dd9d10518d52213a896222385a4fac1210474032d3fcb4d2dc641e5ff6c8ee997774b8900e87b26c1174be0b023f259611b346b64bb62f241cd88d7034241d56544095286790c1518a3489535bb533169de66ca2f04b1992ad1db375046e7fce4ed4a213a017e8f5d2517ccd67701a", 0x9e, 0xfffffffffffffffd) pipe(&(0x7f0000000080)) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xc32, 0x86393f31c55fa2ea, 0x1, r1}) 13:02:12 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:12 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x05\x00', &(0x7f0000000040)=ANY=[]}) 13:02:12 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) [ 233.199074][T16779] overlayfs: conflicting lowerdir path 13:02:12 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) [ 233.379080][T16791] overlayfs: conflicting lowerdir path 13:02:12 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:12 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 233.470437][T16792] overlayfs: workdir and upperdir must reside under the same mount [ 233.506432][T16801] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000000, 13:02:12 executing program 2: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x20005, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x3) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(0xffffffffffffffff, 0x110, 0x3) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net//yz1\x00', 0x1ff) add_key$user(&(0x7f0000005400)='user\x00', 0x0, &(0x7f0000005480)="45f42843e6d73a309b3ac18629e51d8f10e3201faad0f8814d466be4343648e652621194a09fd4affe80233e44c0f6dd9d10518d52213a896222385a4fac1210474032d3fcb4d2dc641e5ff6c8ee997774b8900e87b26c1174be0b023f259611b346b64bb62f241cd88d7034241d56544095286790c1518a3489535bb533169de66ca2f04b1992ad1db375046e7fce4ed4a213a017e8f5d2517ccd67701a", 0x9e, 0xfffffffffffffffd) pipe(&(0x7f0000000080)) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r3 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000640), 0x12) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000080)={0xc32, 0x86393f31c55fa2ea, 0x1, r1}) 13:02:12 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x06\x00', &(0x7f0000000040)=ANY=[]}) 13:02:12 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:12 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x6450, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xc, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x80000001}) 13:02:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\a\x00', &(0x7f0000000040)=ANY=[]}) [ 233.827183][T16831] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000000, [ 233.874613][T16820] overlayfs: workdir and upperdir must reside under the same mount 13:02:13 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 13:02:13 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:13 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:13 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00@\x00', &(0x7f0000000040)=ANY=[]}) [ 234.071543][T16815] overlayfs: conflicting lowerdir path [ 234.264127][T16954] EXT4-fs (sda1): re-mounted. Opts: init_itable=0x0000000000000000, [ 234.309525][T16950] overlayfs: workdir and upperdir must reside under the same mount 13:02:13 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:13 executing program 0: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f00000000c0)={0x101, 0x0, 0x2018, 0x6, 0x1f, {0xfffffffffffffeff, 0x6}}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009405, &(0x7f0000000000)={0x400000000, 0x8000000000000000}) 13:02:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00H\x00', &(0x7f0000000040)=ANY=[]}) 13:02:13 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:13 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:13 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x40000000}) 13:02:13 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x94100, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fchdir(r0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000000)) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) setsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f00000000c0)="c274cd7bee1b949f7efc0d40dd2204fc9fdd72bfeeacb146c7a13394825c9e776f35b2b9c94a9e0c40759a69a6808273", 0x30) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000002c0)={0x8, 0x1}) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x20, 0x0, 0x8, 0x2d, 0x0}, &(0x7f00000001c0)=0x10) perf_event_open$cgroup(&(0x7f0000000300)={0x1, 0x70, 0x8, 0x80, 0x1ff, 0x0, 0x0, 0x4, 0x40000, 0x2, 0x2, 0x0, 0x20, 0x100000000, 0x1, 0x2, 0x0, 0x6, 0x1cae65d8, 0x61f786f9, 0x6, 0x1ff, 0x7, 0x2, 0x7, 0x8, 0x4, 0x24, 0x3, 0x3f, 0x100000001, 0x101, 0x7, 0x0, 0xffffffffffff1ce7, 0x1dfb, 0x7f, 0x45a, 0x0, 0x9, 0x2, @perf_config_ext={0xe000000000000, 0x6}, 0x2, 0x100000000, 0xffffffffffffffc0, 0x9, 0x4, 0x6, 0x66688982}, r0, 0x3, 0xffffffffffffffff, 0xd) ioctl$KVM_GET_REGS(r0, 0x8090ae81, &(0x7f0000000380)) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000200)={r1, 0x4}, &(0x7f0000000240)=0x8) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000040)={{0x6, 0x4}, 0x68}, 0x10) 13:02:13 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00L\x00', &(0x7f0000000040)=ANY=[]}) [ 234.686441][T16979] overlayfs: workdir and upperdir must reside under the same mount 13:02:13 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:14 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x13, &(0x7f0000000200)='/dev/btrfs-control\x00'}, 0x30) perf_event_open(&(0x7f0000000140)={0x2, 0xfffffffffffffec5, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000100)={0xf000000, 0x9, 0x8, [], &(0x7f0000000080)={0x9a090e, 0x8f, [], @p_u32=&(0x7f0000000000)=0x81}}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:14 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) [ 234.932036][T16985] overlayfs: conflicting lowerdir path [ 235.017279][T17053] overlayfs: conflicting lowerdir path 13:02:14 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:14 executing program 2: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, 0x0) 13:02:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00h\x00', &(0x7f0000000040)=ANY=[]}) 13:02:14 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:14 executing program 4: mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:14 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000080)=0x3ff, 0x4) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009405, &(0x7f00000000c0)) 13:02:14 executing program 4: mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00l\x00', &(0x7f0000000040)=ANY=[]}) [ 235.324769][T17127] EXT4-fs (sda1): re-mounted. Opts: [ 235.360623][T17128] overlayfs: workdir and upperdir must reside under the same mount 13:02:14 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 235.433801][T17137] overlayfs: conflicting lowerdir path 13:02:14 executing program 4: mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:14 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:14 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x400, 0x60000) bind$ax25(r0, &(0x7f0000000200)={{0x3, @null}, [@null, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) getpeername$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) bind$xdp(r1, &(0x7f0000000100)={0x2c, 0x2, r2, 0x7}, 0x10) r3 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x3e7, 0x0, 0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r3, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009405, &(0x7f00000000c0)) [ 235.785032][T17261] overlayfs: workdir and upperdir must reside under the same mount 13:02:14 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00t\x00', &(0x7f0000000040)=ANY=[]}) 13:02:14 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0x1}, 0x28, 0x3) 13:02:14 executing program 4: creat(0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:15 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 235.883499][T17269] overlayfs: workdir and upperdir must reside under the same mount 13:02:15 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:15 executing program 4: creat(0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00z\x00', &(0x7f0000000040)=ANY=[]}) 13:02:15 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) [ 236.149324][T17290] overlayfs: workdir and upperdir must reside under the same mount 13:02:15 executing program 4: creat(0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:15 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x01\x00', &(0x7f0000000040)=ANY=[]}) [ 236.382432][T17288] overlayfs: conflicting lowerdir path [ 236.500215][T17418] overlayfs: conflicting lowerdir path 13:02:15 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:15 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x28, r1, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @rand_addr=0x10000}}]}, 0x28}, 0x1, 0x0, 0x0, 0x40000}, 0x40) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:15 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:15 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[]}) 13:02:15 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[]}) [ 236.796138][T17436] overlayfs: conflicting lowerdir path 13:02:16 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:16 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000080)={0x3ff}) 13:02:16 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[]}) 13:02:16 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) [ 237.274989][T17448] overlayfs: conflicting lowerdir path 13:02:16 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:16 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000000)={0x20}, 0x1) 13:02:16 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, 0x0, 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[]}) 13:02:16 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:16 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[]}) 13:02:16 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:16 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:16 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000080)={0x0, 0xffffffffffffffff}) 13:02:17 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:17 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 237.934882][T17601] overlayfs: conflicting lowerdir path 13:02:17 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:17 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000001c0)={0x4b9, {{0xa, 0x4e23, 0x5, @loopback, 0x6}}, 0x1, 0x1, [{{0xa, 0x4e24, 0x8, @empty, 0x4}}]}, 0x110) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f0000000000)=0x400) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f0000000080)=0x800) 13:02:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[]}) 13:02:17 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:17 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:17 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 238.202348][T17729] overlayfs: workdir and upperdir must reside under the same mount 13:02:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0xc0045878, &(0x7f00000000c0)) 13:02:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[]}) 13:02:17 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) [ 238.425644][T17755] overlayfs: conflicting lowerdir path 13:02:17 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0x454) ioprio_get$uid(0x3, r0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009405, &(0x7f00000000c0)) 13:02:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0xc0045878, &(0x7f00000000c0)) 13:02:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[]}) [ 238.696226][T17747] overlayfs: conflicting lowerdir path 13:02:17 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:17 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:17 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:17 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0xc0045878, &(0x7f00000000c0)) 13:02:17 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[]}) 13:02:17 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x1855c0, 0x0) ioctl$TIOCNXCL(r0, 0x540d) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009405, &(0x7f00000000c0)={0x42}) 13:02:18 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:18 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[]}) [ 238.963465][T17904] overlayfs: conflicting lowerdir path [ 238.976612][T17888] overlayfs: workdir and upperdir must reside under the same mount 13:02:18 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:18 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[]}) 13:02:18 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000000)=0xf9a, 0x4) readahead(r0, 0x3ff, 0x6) 13:02:18 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:18 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) [ 239.242390][T18021] overlayfs: conflicting lowerdir path [ 239.303295][T18023] overlayfs: conflicting lowerdir path 13:02:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[]}) 13:02:18 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:18 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:18 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:18 executing program 1: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0x454) ioprio_get$uid(0x3, r0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009405, &(0x7f00000000c0)) 13:02:18 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[]}) 13:02:18 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000000)={'bond0\x00', {0x2, 0x4e21, @loopback}}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) socket$inet6(0xa, 0xa, 0x5) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) ioctl$CAPI_GET_ERRCODE(r0, 0x80024321, &(0x7f0000000100)) [ 239.620227][T18153] overlayfs: workdir and upperdir must reside under the same mount 13:02:18 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:18 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:18 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x01', &(0x7f0000000040)=ANY=[]}) 13:02:18 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:19 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:19 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 239.932666][T18185] overlayfs: workdir and upperdir must reside under the same mount 13:02:19 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:19 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f00000000c0)=0x30) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000080)={0x6}) 13:02:19 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x02', &(0x7f0000000040)=ANY=[]}) [ 240.102423][T18207] overlayfs: conflicting lowerdir path 13:02:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 240.150150][T18199] overlayfs: conflicting lowerdir path 13:02:19 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={[{@init_itable_val={'init_itable'}}]}) 13:02:19 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:19 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:19 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) ftruncate(r0, 0x0) 13:02:19 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x03', &(0x7f0000000040)=ANY=[]}) [ 240.331000][T18326] overlayfs: conflicting lowerdir path 13:02:19 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:19 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, 0x0) 13:02:19 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x7724, 0x0, 0x10000, 0xeb38}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f0000000080)={0x3ed, r1}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:19 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x04', &(0x7f0000000040)=ANY=[]}) 13:02:19 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) [ 240.665176][T18353] overlayfs: conflicting lowerdir path [ 240.752392][T18382] EXT4-fs (sda1): re-mounted. Opts: 13:02:19 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:20 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:20 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, 0x0) [ 240.819714][T18349] overlayfs: conflicting lowerdir path 13:02:20 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:20 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x3ff}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e24, @multicast1}}, [0x8, 0x1, 0xfffffffffffffbe6, 0x5, 0x1f, 0x2c44272b, 0x0, 0x7, 0x8a, 0x3, 0x8, 0x0, 0x3, 0x7fff, 0x7b]}, &(0x7f0000000100)=0x100) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x05', &(0x7f0000000040)=ANY=[]}) [ 241.021145][T18483] EXT4-fs (sda1): re-mounted. Opts: 13:02:20 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) [ 241.074649][T18476] overlayfs: workdir and upperdir must reside under the same mount 13:02:20 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, 0x0) 13:02:20 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000000)=0x0) write$P9_RREMOVE(r0, &(0x7f0000000100)={0x7, 0x7b, 0x1}, 0x7) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000080)=r1) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f00000001c0)=""/231) 13:02:20 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x06', &(0x7f0000000040)=ANY=[]}) 13:02:20 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) [ 241.398047][T18525] EXT4-fs (sda1): re-mounted. Opts: 13:02:20 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)) 13:02:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\a', &(0x7f0000000040)=ANY=[]}) [ 241.475980][T18493] overlayfs: conflicting lowerdir path 13:02:20 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0xc0045878, &(0x7f00000000c0)) [ 241.599228][T18614] overlayfs: workdir and upperdir must reside under the same mount [ 241.679275][T18628] EXT4-fs (sda1): re-mounted. Opts: 13:02:20 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, 0x0) 13:02:20 executing program 0: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/btrfs-control\x00', 0x40, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$9p(r0, &(0x7f00000000c0)="17e481f48d9e74c7507bba450131001cb74dfc2480d7b5099d44f21938df34b631bbc69501ce8cc9296706e1d3ef1a17b9cf67e50866a1e9a6282b576c", 0x3d) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x2000000) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000080)={0x6, 0x8}) write(r1, &(0x7f00000001c0)="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", 0x1000) 13:02:20 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:20 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0xc0045878, &(0x7f00000000c0)) 13:02:20 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)) 13:02:20 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00@', &(0x7f0000000040)=ANY=[]}) 13:02:21 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={r0, 0x0, 0x1000200000000000, 0x7}) [ 241.947696][T18639] overlayfs: workdir and upperdir must reside under the same mount [ 241.968926][T18650] EXT4-fs (sda1): re-mounted. Opts: 13:02:21 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0xc0045878, &(0x7f00000000c0)) 13:02:21 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00H', &(0x7f0000000040)=ANY=[]}) [ 242.015082][T18653] EXT4-fs (sda1): re-mounted. Opts: [ 242.104385][T18666] overlayfs: conflicting lowerdir path 13:02:21 executing program 4: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)) 13:02:21 executing program 1: creat(&(0x7f0000000280)='./file0\x00', 0x0) mount$fuse(0x20000000, &(0x7f0000000000)='./file0\x00', 0x0, 0x101003, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x2004020, &(0x7f00000001c0)) 13:02:21 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0xc000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:21 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:21 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, 0x0) 13:02:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00L', &(0x7f0000000040)=ANY=[]}) [ 242.349147][T18685] EXT4-fs (sda1): re-mounted. Opts: [ 242.380782][T18683] EXT4-fs (sda1): re-mounted. Opts: 13:02:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00h', &(0x7f0000000040)=ANY=[]}) 13:02:21 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000080)='*\'wlan0\x9f#\\)\x00', &(0x7f0000000100)="bb7489078b584a6853ef73088948b00189bfb2d617ed04a552", 0x19) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000000)='/dev/btrfs-control\x00', &(0x7f00000001c0)="8261890affac2a24d08d1ff7199f9584fae71a8856b2c6b171344890f86690158a3c58ef246c9b489eb040d51a034bde28e4cd2702ea30131c78e6c863b474578021cbb130549c9ab5feae62f9e26990802dd2e81742550c65a240a5a6b2c9392dd91be0eedec4e46b437eb138673abb014f1f70a559facbf3aca410dded0e9a0e22ef552ba92dae351c74d5e6625342c19c72c576077b9ddd6352ab0797796cf4129b6de911df5c987641a6aa53009ea63d37b156be9a32a9fa74bd879a7f9c23fc1be14f25c26b00b592eb334dbe3c510c80b3110f9f", 0xd7) ioctl$TIOCMSET(r0, 0x5418, &(0x7f00000002c0)) 13:02:21 executing program 4: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:21 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:21 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, 0x0) 13:02:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00l', &(0x7f0000000040)=ANY=[]}) [ 242.720385][T18709] overlayfs: workdir and upperdir must reside under the same mount 13:02:21 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:21 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, 0x0) [ 242.806278][T18721] overlayfs: conflicting lowerdir path 13:02:22 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:22 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f0000000080)=0x216) getrandom(&(0x7f00000001c0)=""/193, 0xc1, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f00000000c0)=0x31ad) socket$nl_netfilter(0x10, 0x3, 0xc) 13:02:22 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00t', &(0x7f0000000040)=ANY=[]}) 13:02:22 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:22 executing program 0: getpeername(0xffffffffffffffff, &(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000000)=0x80) r1 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0xe840) dup2(r0, r1) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x50009405, &(0x7f0000000240)) fremovexattr(r0, &(0x7f0000000100)=@known='trusted.overlay.upper\x00') openat$vfio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vfio/vfio\x00', 0x101000, 0x0) [ 243.149502][T18842] overlayfs: workdir and upperdir must reside under the same mount [ 243.178852][T18799] overlayfs: lowerdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 13:02:22 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00z', &(0x7f0000000040)=ANY=[]}) 13:02:22 executing program 0: pipe2(&(0x7f0000000000), 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:22 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x02\x00', &(0x7f0000000040)=ANY=[]}) [ 243.463226][T18851] overlayfs: conflicting lowerdir path [ 243.480866][T18955] overlayfs: conflicting lowerdir path 13:02:22 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:22 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:22 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0xfffffffffffffffe, 0xffffffffffffffff}) 13:02:23 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:02:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x03\x00', &(0x7f0000000040)=ANY=[]}) 13:02:23 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) r1 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r1}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 243.890282][T18989] overlayfs: conflicting lowerdir path 13:02:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x04\x00', &(0x7f0000000040)=ANY=[]}) 13:02:23 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:23 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001900)={0x0, @multicast2, @loopback}, &(0x7f0000001940)=0xc) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000001980)={@dev={0xac, 0x14, 0x14, 0x22}, @broadcast, r1}, 0xc) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x05\x00', &(0x7f0000000040)=ANY=[]}) 13:02:23 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) [ 244.264516][T19011] overlayfs: workdir and upperdir must reside under the same mount 13:02:23 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8914, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:23 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = semget(0x0, 0x3, 0x2) semctl$IPC_RMID(r1, 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) [ 244.310356][T19015] overlayfs: workdir and upperdir must reside under the same mount 13:02:23 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:23 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:02:23 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x06\x00', &(0x7f0000000040)=ANY=[]}) 13:02:23 executing program 0: r0 = io_uring_setup(0x200000000000a86, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x2}) io_uring_enter(r0, 0x0, 0x80, 0x3, &(0x7f00000004c0), 0xfffffe71) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$VT_RESIZE(r1, 0x5609, &(0x7f0000000000)={0x1, 0x80000001, 0x7}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009405, &(0x7f00000000c0)={0x4}) [ 244.593557][T19047] overlayfs: conflicting lowerdir path 13:02:23 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:23 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:02:23 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\a\x00', &(0x7f0000000040)=ANY=[]}) [ 244.709201][T19046] overlayfs: workdir and upperdir must reside under the same mount 13:02:23 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8914, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:23 executing program 1: ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x50009404, &(0x7f00000000c0)) 13:02:23 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00H\x00', &(0x7f0000000040)=ANY=[]}) 13:02:24 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) write$sndseq(r1, &(0x7f00000001c0)=[{0x100000000, 0x7, 0x1, 0xd96, @time={r2, r3+30000000}, {0x1, 0x1}, {0x8, 0x1}, @queue={0x3, {0x81, 0x8000}}}, {0x4, 0x8000, 0x1000, 0x3af, @tick=0xb83, {0x9, 0xfffffffffffffffd}, {0x3, 0x7f}, @result={0x7f, 0x4}}, {0xffff, 0x8, 0x1ae, 0x1, @time={0x77359400}, {0xfffffffffffffff7, 0x9}, {0x0, 0xffffffffffffff01}, @quote={{0x0, 0x8}, 0xffffffff, &(0x7f0000000100)={0xfffffffffffffff9, 0x7, 0xfffffffffffffffd, 0x3, @time={0x0, 0x989680}, {0xf03, 0x5}, {0x80000001, 0x5b5b}, @raw32={[0x6, 0x2, 0x34f1]}}}}, {0x4, 0x7ff, 0x0, 0x3, @time={0x77359400}, {0x2, 0x9}, {0x9, 0x80000000}, @time=@time}], 0xc0) flock(r0, 0x4) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r4, 0x50009405, &(0x7f00000000c0)) [ 244.911068][T19070] overlayfs: conflicting lowerdir path 13:02:24 executing program 1: ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x50009404, &(0x7f00000000c0)) 13:02:24 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:24 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:24 executing program 1: ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x50009404, &(0x7f00000000c0)) [ 245.107713][T19074] overlayfs: workdir and upperdir must reside under the same mount 13:02:24 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00L\x00', &(0x7f0000000040)=ANY=[]}) 13:02:24 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:02:24 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) [ 245.355720][T19101] overlayfs: conflicting lowerdir path 13:02:24 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00h\x00', &(0x7f0000000040)=ANY=[]}) 13:02:24 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009405, &(0x7f00000000c0)) 13:02:24 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:02:24 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x9, 0x400c0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000080)={0xff, 0x0, 0x2, 0x4}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f00000000c0)={0x9, r1}) r2 = openat$ion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000100)={0xa925, 0x29, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f0000000000)=0x3) fsetxattr$trusted_overlay_opaque(r2, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x69ac483d2e1cef84) 13:02:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00l\x00', &(0x7f0000000040)=ANY=[]}) 13:02:24 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:24 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) [ 245.757196][T19124] overlayfs: workdir and upperdir must reside under the same mount 13:02:24 executing program 4: r0 = socket$packet(0x11, 0x4000000000002, 0x300) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x7, 0x101000) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f0000000040)={0x401, 0x14, [0x7fffffff, 0x4, 0x4, 0x1, 0x1]}) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000000), 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)=ANY=[@ANYBLOB="5f454c44065b05007311"], 0xa) close(r4) socket$netlink(0x10, 0x3, 0x4) write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r2, 0x0, r4, 0x0, 0x80000001, 0x2) socket$inet_udp(0x2, 0x2, 0x0) 13:02:24 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x50009404, &(0x7f00000000c0)) 13:02:25 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00t\x00', &(0x7f0000000040)=ANY=[]}) 13:02:25 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x50009404, &(0x7f00000000c0)) 13:02:25 executing program 1: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x50009404, &(0x7f00000000c0)) [ 246.079537][T19152] overlayfs: workdir and upperdir must reside under the same mount 13:02:25 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00z\x00', &(0x7f0000000040)=ANY=[]}) 13:02:25 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, 0x0) 13:02:25 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) prctl$PR_SET_FPEXC(0xc, 0xa02ffb73d5728fff) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x10100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x10, 0x0, 0x5000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x438, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:25 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 246.324921][T19175] overlayfs: conflicting lowerdir path [ 246.457561][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 246.463957][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 246.513215][T19193] overlayfs: conflicting lowerdir path 13:02:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[]}) 13:02:27 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:02:27 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, 0x0) 13:02:27 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/btrfs-control\x00', 0x800, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@sack_info={0x0, 0x3, 0x1}, &(0x7f0000000080)=0xc) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000100)={r2, 0x100000000, 0x7}, 0x8) 13:02:27 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:27 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009405, &(0x7f00000000c0)) 13:02:28 executing program 1: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, 0x0) 13:02:28 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009405, &(0x7f00000000c0)) [ 248.941006][T19206] overlayfs: conflicting lowerdir path 13:02:28 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[]}) 13:02:28 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:28 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x5018af5afab827d9) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=0x0, &(0x7f0000000100)=0x4) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={r1, 0x6, 0x1, 0x6f}, 0x10) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x50009405, &(0x7f00000000c0)) 13:02:28 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 249.182129][T19229] overlayfs: conflicting lowerdir path [ 249.419708][T19236] overlayfs: conflicting lowerdir path 13:02:31 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) syz_genetlink_get_family_id$tipc(0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(0x0, 0x0, 0x0, 0x0) 13:02:31 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009405, &(0x7f00000000c0)) 13:02:31 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[]}) 13:02:31 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) write$P9_RSTATFS(r0, &(0x7f0000000240)={0x43, 0x9, 0x1, {0x1, 0x20, 0x3, 0x100000001, 0x100000001, 0x800, 0x6, 0x10001, 0x3}}, 0x36c) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000080)={0x980000, 0x8001, 0x2, [], &(0x7f0000000000)={0xb80937, 0x8, [], @value=0xa283}}) 13:02:31 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:31 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 251.997817][T19351] overlayfs: conflicting lowerdir path 13:02:31 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:31 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\a\x00', &(0x7f0000000040)=ANY=[]}) 13:02:31 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x4601, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:31 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) [ 252.248330][T19419] overlayfs: conflicting lowerdir path [ 252.314771][T19352] overlayfs: conflicting lowerdir path 13:02:31 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 252.581516][T19485] overlayfs: conflicting lowerdir path 13:02:34 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00@\x00', &(0x7f0000000040)=ANY=[]}) 13:02:34 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) 13:02:34 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f0000000080)={0x20000008}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009405, &(0x7f0000000000)={0x0, 0x6e0}) 13:02:34 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:34 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:34 executing program 4: setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) 13:02:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00H\x00', &(0x7f0000000040)=ANY=[]}) [ 255.081426][T19503] overlayfs: conflicting lowerdir path 13:02:34 executing program 4: setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) [ 255.176634][T19502] overlayfs: conflicting lowerdir path 13:02:34 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:34 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x3) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e21, 0x14, @remote, 0x10001}, 0x1c) 13:02:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00L\x00', &(0x7f0000000040)=ANY=[]}) [ 255.323997][T19495] overlayfs: conflicting lowerdir path 13:02:34 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:34 executing program 4: setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) 13:02:34 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x8, 0x3}) 13:02:34 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) [ 255.575442][T19626] overlayfs: workdir and upperdir must reside under the same mount 13:02:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5421, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:34 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00h\x00', &(0x7f0000000040)=ANY=[]}) 13:02:34 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:34 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) 13:02:34 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x5421, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:34 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000080)={0x34}) 13:02:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00l\x00', &(0x7f0000000040)=ANY=[]}) 13:02:35 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000)=0x8, 0x8) [ 255.974276][T19658] overlayfs: conflicting lowerdir path 13:02:35 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:35 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:35 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:35 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r0, 0xaead) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000080)={0xfffffffffffffb4e, 0xcb9}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$assume_authority(0x10, r1) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x7, 0x4) 13:02:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00t\x00', &(0x7f0000000040)=ANY=[]}) 13:02:35 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) [ 256.305156][T19681] overlayfs: conflicting lowerdir path 13:02:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00z\x00', &(0x7f0000000040)=ANY=[]}) 13:02:35 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:35 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:35 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x4000, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) [ 256.473314][T19675] overlayfs: conflicting lowerdir path 13:02:35 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:35 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x01\x00', &(0x7f0000000040)=ANY=[]}) 13:02:35 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:36 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:36 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:36 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x852, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:36 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[]}) 13:02:36 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) 13:02:36 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:36 executing program 4 (fault-call:1 fault-nth:0): r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:36 executing program 2: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:36 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) [ 257.218608][T19859] overlayfs: conflicting lowerdir path [ 257.265326][T19833] overlayfs: conflicting lowerdir path 13:02:36 executing program 2: setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) 13:02:36 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = fcntl$getown(r0, 0x9) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f00000001c0)={0x2, 0x0, 0x2, 0x0, 0x0, [{r0, 0x0, 0x2}, {r0, 0x0, 0x80000000}]}) 13:02:36 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x2}, {0x2, 0x7, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x64, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[]}) 13:02:36 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:36 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x2, &(0x7f0000000000), 0x8) 13:02:36 executing program 2: setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) 13:02:36 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x6, &(0x7f0000000000), 0x8) 13:02:36 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:36 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000380)={0x0, 0xa8d}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000400)={r1, 0x1000, "d5279ff0993a1cf1e99f2afcd4aa940dafe27a9ffac748005d25148f88ae2f928b17c3b5d55034fee4c577124603331ab29f94c06d73eda59ee1ef912924b9909f9d08ffe54e4605cf5a01ec8e96f560833c25d64ea87c620ada91c0fa4eb2749795a7ada8aa4df47ae208562b7e26bb66a1c22a7bad5be542db3841daae4247efd3125faea85aae60ed9b1af1e928ef9c4d0d6ebe6a1b233cf05b4c7058fbf485a1ebad27b3955ea77ef0fcd88ce82df293a6ea9a2f1a371b330a8aad45ddcc44f4fcb8f94c9d56b1e8aeeafd7f517f8f85f9c6149f0cbf75d084cfd1b400da10707540e3794335806ca0049f66f1caac9aba07cf7af5aa074487bbc7c94eae01c670318f307fb9076435e516d6975dcd8dd58b2830cec48863ec47b217ebd4a8a684a6b7bbeb31293a2d5374f42e0383ca266a6824cfd7e59d301ed09cbf11caaf934cc512abff491628623401344ee94ae07eac3c263e75b504af18e703eb4cde438109196bb63a7a34734fc22d1363bac497c91c6c888030bc93fb117f07e6c3aabd2710beace1d4835690782b80be143f720a63b223526e788b992b9884d6119ef55bfcc69d280e98d6c9f544c09622ff2fbcb06e2f625151f4fc03224450a2f79d161f93e3d7eb466fcb930028cbdf65e14d44593a56bf9375ed029cbd463bef7850cffa962e52d446c1a9737825d9fed6f82e246b189b24ca7ba8db01870ae25f4ec26b4660cf6a25325f083b00d58be0952ce70568add6d4bcc2e5b9efd88ba89df3c4616f7e82dba7ca99ff91777813b6bfd6936d3fb1d365c97208cb118692c118abbdfdc714d8fa6397edd0a7ea14912aa471177322b5ed3bd50a76883b79b9c82e0fdd9fb1d85aadf4b2cec77e3d485219c8dc4f0abc227e55b92b267099e7fe1b514df84302962f2c32a77b83183014b65c8ed165ac7b4909cb1ec61324c05068827e535b07228f8c1bc0fce7ed9ed75ed178bacf92247c69dc553dcfa7d909a4e8116ba87c7323bf88e613cc724a7105d6be0f2c201d0edaf0fbdd3e148aa7f3ba27f2d9845f16f1380a53aaade26cf33687899f459ebc9df91a118625898e8ccce90897fd5664d6ce942ef47c8f68f9867a6b5a176a102b4c30fd8e842d338399ee1797d3530d41743ee99ea047aab33932f44d5390a7a4aa7007b75b8cfaf457ff0e43503a57941ea28619560db6c2b2018482dca1491298b340d87a4511e4abd54d59398c8499a2974b1463a9888cb672cae664ef45819d59526d36f9348442020aa37fb15182d9845291d9beb7d500ee7e17139f5640f7e13ac8492bdb14ff72b6339aaeaf98f216fe45bf61e68edd37820374ee257ad8fa037df006098e984bac2e1e555190cc971ad598c446912519cdfea48ef22ba64b90d0f483091de6ab4265bd99498f99043a4f48773dcb4528a07e72b0f79ac849a94905a9a90a1b44205f693ae37d331b194143d6f8bdef1e3bfd930178a826708bcb0a9c234cd071c0da25aa6b38f62b96dfdbc9876eda58818c85d6efcb87af2d62ef704141e18c073a0ffd0420ca836eddaf8ab1660cf224d8bff916591c2884e6671878fd23826caab53ba984136e3f216ea62d164d59ac2115fb713d897a23f4b1576ee9fc35f5a68e2e89441314d26524f5cfc8f281b4dd084923594eeb0ae552f16a75d2c7035611773744119ecb4f5a73cf4d2c73956b20d583b90f7a5177fe8890f66c7ce95a5d21e3d8499f7940c6431fd16be75669519caa0bbcf307b3bd96df97df1e5cd095d3bb24d222cfa900093a65abb810eee007a214ad5f185f1099dfbf499984a7a0023c125ac43196e7dd077a82d614b384e5a4c0d271ebc11a4c7ae0cf5ac6b870b7c0008f3a3dfe157ca1f90be09ee1f834855b34d46aaa6982bc4195cc3206ec9bc727d6db59db455c6378c86a2c4cd9cc9afd3adb0a94673e167d501589212e23cfe4ed4a1d0176d012fe778edc8315c566f6b510fcc44ea22ac70464f17f74233ce57c7219c33b5c0aa81bf083493635d233b51acc2df21eea26c700c5051860dd42fcd40461f208b41d77574adff85a89d0f7517746956b587b237acccef8a56f25515b8fb5218614466837634e4aa3a280329b0caf39fbc762d4758bd61aa21f848f0e84e072746cdf865e357070ec14b2050dea18d4dc1e3ad861ebab9c90a0942baba4d8c1f728bdf7cb9df895c57d140d5e42219df06ca0c62f053208d5767057ec46848561dea0fa9d596b4662e2664b200a31821f9988a44e455b7a41c31e606f24b321a74d026a364ba5b6e33690717f245f85ee667fbce8ca9587bc49ce19531c4d6a5ffb069c8b121d22a6ccf6557915289d991de3703768022e80fe5d214befd78dd510042086f1765564efc494aad508347d9deb34222b92463a569cb623f87cb8a384f719ecd884fe2eb9f96a81bb6c796a05d89fe301001aa2df9c3e3672e5ecc381a5d4cf9ce2c969e2f8a0744f410c8f70117c5eddf17cd4e7b694040130a509c3b9e48853931f3efb6d6f9af3d6d2ddea3fa78ab446e7a7302550d15d448ca4294bad6ecd0b80204aaf0f7c23a36051ed943ae126fa19789ec6b4869f0864bdc2d7881d9956cfb3e032645ea0031b64f9bebe576eef3e0187b5881ac90a3abc844540b53d26621d56707e79cf344c0166979beeddeba7f2f69154a2160c3c8c68e956d19c4e7b2b7c1c3f0515379ae540ca61624382d4e3a75b3092782ba43e9329c30f196136b4dc33318bf6595a4a17a6d1528cdd121d8cc5a0ee851a6497f56656616f045fe0389078c1b85fbacf21d40ca30d07a8ce12a7448882323d8b697c667b6717c6809894ac3afbc187178a860ac54f1006064e5f6bba388a9d17388b01ffa713274f079dd06132f34f8f308bb9a98d6bf4fd80f74273fbe5df86fa6197f269ada070772876c717f3afe41f4dc5793cc5b0f0469b0a9e32442a759856cc9e2f709dbcf9d061c135d9032c1f964c13f3b4f9ef377041e93f13788744801cf3c7dedc52b48dc273339de758f65da72b60dab702b2811c2351902b74bf5e6238e673b1240703ef97c4b3fca92d2f195b03a424f29cd40986899a9978863a68bbcd8ae5b649f27b3ac3fa4a3ec73877096a94a2fad33da2553e1800a84c81dc1cf742c048adfd45c44e0a08cb17b24e20f7f6c0a9af51e4950e23bfb5d5be5f1fc030ad74c4672159b11fcb5b6ed9b4cf7e9597c5deb9e09c128997971baa0cfb3ca475f5cbe30940c26c083a026cae2c92ed4e7decbec1c9ddea97d3864977922e8c99adf6eb79fedf7550e55f994499f3834f7f0db65fe9ad04b6318af41c615c062f93e8e71059e03fd49a8615b4a98fac4585728ed462f1dbe2c6e5041fa0a712f2f45ca70a34bf11f062c7ec0ad13aaf850c77045e20b8bf4111a3a4cb7537e1fa01b2c1fe3fc7b1e21809f93f883300ec4febbb898e9f2970be80b54cb2b2d35805240132a989a5ff92364591d6aa0c8b6d6bd20d4445feb7cf8307eeb52fcdb1f86b51b6718a8b1a673fe870ba079e34b6d9029f5bd08a9771b46d83eb6f73223dc5ef56f9cda809ff803621a2a2951354d0f5fa9985555e5f8431e8ce30b44a74f80f45d6f66dd3af3decfc98d84ec201ba6bd28f5a2604fda059ce1d30f1ce860e647f792997b9b9a893ec8599d75bac553b73fb301d00b962c515acb0b904e714baf15aab341b40b794b96b72620d7ef253a148e47d560c2587145bbdb7fb4c2243ef0756416a13529fadad0b9b1073ec9e1a061a9f98eac45ede737eda20fd34eecc761368a4615e691e083be8d1409dbc603084f1267b6fd5976ff9d1bce5204c7cbf68a2559055cdc83f66abc2907566ea71bd012d4312523859b4865e3ffa2e4640e22d57ae2c2b334e8fe7d0637a87750702b6ffd9c6a221562eb9c33bb9c999640fcd34c4a1cec8878f9365be12ce75e09466218f3ae9f2ef2d884c5d474b30bd94d0942697fc3b5362d3ae1db19a6584eef71620301a08f4da999770feff30209963f21bb0ef7ac514f19a7ed8f2fa8e9de84d8f7707b2adb5474b1f137694241bfb786f9317959342477ee2a1f45603e343cc37ebc38ff610e757d861fc9363b5ecb85979d4b4a6490b34e70be40dccf1ed14f15cc931dc3aa449065e669cfa7b6a84f78409f7d1f7cd5a2db393d87a7ac9992e557acb7a0e6a7bba27ad164070598bac90237f271b3e572f74f5ae6e9a4b693b94746d6f5258a01f37809aa983ae64f4301c2372083a93d644584efe00243efa52f8a06b3089e8822578c73cb8e5cf09d3052a54571a08aef74358398d808cb47aed807b5be8998abf4478ff8593f957d4ccbf9cfbb8f5b830559076bc4ba0182e86b16b2114cc1a6e670cf00f085e5508a1d410930f5071739e5b00ab31d5a78833dae939362f606d2eecc737a6e7cdc698aa5542c99c1b150d101a7a7a5bfca17ce5c6488cbc76f2e6cb4c71b7f20a23e75c6844d2e91143348bee8ab9ea58b248f2e5981892434c8b5d3663aba7bd84494ecbb395509e41d261cc177b24e6bd99b5a78bfcb46fe7a4ee83af960a51c30ee63ddc1be86e0dc8f6fbbdc765b134a57f3cde178b7a7363fc05af055ebcda4222780a62cb8dbe5286b5491b9828530e90a24d2838c8c411cf6266a5859c647000db5302c9863f85a94b2ddf603ede6b742426140029fb7302c0dce311e182422de6261e790ef0a9b63600b3d70caa0d25742359f8efe6769672a313f9cd4361d44152f17846a1e46e0fa60ee224f829f702c9564b0a3a0d036acedff6767551bb6a7d9ff5412fe20f802e583622b6b887d7dd8f27e46745cba5eb0fa0f3f9dcd04899f7a96d11586aba4387d823242cdc3602dc43e811735425527cd49b482c0d07d733966a364619fa1eb03b1ec437f60413ffb56415d6f77dc890ebb8fd532df7ef0adf56643ea8d1c77bcdf5155305f62533f44a6aa12cabe87520df85e94bc94813fe965e802feef2c4f6ba850c1f5c1d54692af35a4d0120cd131d324ae0876fa856eb5b9c8b4a2c00d4da172fea0e45cfbcf13456c61aa5b88cf1625e9290637d43741eaae29d0b461ea556efb27f3fc73db08e8b5339e465a70729ce802eafb6303d4835759696e10e4cc5e3cd05ca3b749dbf692027f47518b52a227e4f1dd205424e924690ea5a937064f5cc16531629b586a8e1951427b00bee76558390d2475839f7bb87f08b27ce79ab47f15c651118d41d497ac3a2dde0c4f83d6f45534db6866c74005627235dcf2316473d07940399220e51a1067e01b76f8c39ceaf1bca7226f172f7248d8c35e2197583ab81d23c2f8b1a89ba85f1dd71bc4ac90e45387ff68fb764d3ced22778cfe4e1db564b22bcb7939999817b04d4d8d3f16ef2abfc5527657c44b4d0b7e7f26c8424173d9049203ae0365197e9fd6dc72a2e3dc9ba2a5284e10a69c196e19a71a7eef7b7d71aaf92a26902f9e87868bde20b54fb0314409d557d8efa16b971ce57e77ef44f1798db3c1b7e72bcc5bf200794c1b42368b54d0755b4f6209f47a4631dfb00b651532274fb3c16b391dcf334cc251a5f3ddfe248eb335b1814ea78dd89c12dcfcf695f9bea586a304eec9ae3d5acb3fc432cef88a5c7d50abcfb07c6905d88c38ad743df4d9e99af8a8d93e63349c3e6a8a33ca9d72835b93f4769c8f69382103ecbdc8197178669052bb36d2c19922aa7e9cfa161dda91eb9a7be260cf657acd31be134396e16ff357fa61878458c923cb7d643d4b846b2fad9ebd2a6d30882f3d2"}, &(0x7f0000001440)=0x1008) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x40, r2, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000240)={0x0, 0xa8, "1e4e9e7d3e76246c60aab409c9a40d8af07f3aae5ce77451e8ec3d5c8105d2a87a7c85ecc5a19c5d430e88bb9904a9d303002a965c23af63f62b8564c99fcf126441e5ba4bff9a70e5944b0c9c000daac703051d6cc7ac697e8abb5a896edd04c1f2d8be784bc88d60b84aab28e21ab8297709750fbd5d47a547f2f050b6c7259e77973eed52d4c570649cb685aea6729ed6ab0e21920afed312ca9392abf61fef60178114bdced1"}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000340)=@sack_info={r3, 0x47e, 0x6}, 0xc) 13:02:36 executing program 2: setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) 13:02:36 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[]}) 13:02:36 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x300, &(0x7f0000000000), 0x8) 13:02:37 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) [ 257.974380][T19980] overlayfs: conflicting lowerdir path 13:02:37 executing program 1: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:37 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x40000, 0x8) 13:02:37 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000100)=0x1, 0x1) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:37 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[]}) 13:02:37 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) 13:02:37 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x40000000000, 0x8) 13:02:37 executing program 2: socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) 13:02:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[]}) 13:02:37 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:37 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x7) 13:02:37 executing program 2: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:37 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:37 executing program 0: pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000080)={0x5}, 0x4) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000380)='/dev/btrfs-control\x00', 0x2000, 0x0) ioctl$sock_ifreq(r0, 0x8915, &(0x7f0000000240)={'lapb0\x00', @ifru_settings={0x5, 0x100000001, @te1=&(0x7f0000000000)={0x73, 0x1, 0x1, 0xffffffffffffff2b}}}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f0000000300)={0x5, 0x70, 0x400, 0xffffffffffffffc0, 0x6, 0x1, 0x0, 0x7f4e, 0x400, 0x8, 0x20, 0x547, 0x0, 0x7, 0x0, 0x7, 0x0, 0x800, 0xab1, 0x5, 0x7, 0x1, 0x400000000, 0x2, 0x2, 0x5, 0x8, 0x20000000000000, 0x40, 0x20, 0x100000000, 0x5, 0x81, 0xfffffffffffffffb, 0x6, 0x101, 0xfffffffffffff000, 0x4, 0x0, 0x3, 0x2, @perf_config_ext={0x80000001, 0x3}, 0x20, 0x0, 0x0, 0x0, 0x1, 0x80000000, 0x10001}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x50009405, &(0x7f00000000c0)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x5da, 0x7, 0x4, 0x0, 0x0, 0x6, 0x8000, 0xa, 0x2, 0x6, 0x68, 0xe6c, 0x3ff, 0x3f, 0x100000001, 0x4d6c, 0x8000, 0x3, 0x200, 0x5, 0x4, 0x200, 0x10000, 0x4, 0xff, 0x3f, 0xfffffffffffff8d3, 0x7fff, 0x7fffffff, 0x8000, 0x8, 0x7fff, 0x401, 0x7fffffff, 0x1, 0xc4c7200, 0x0, 0x0, 0x3, @perf_config_ext={0x2, 0xfff}, 0x18000, 0x1, 0xfffffffffffffffa, 0x7, 0x9, 0x6c, 0x100000001}, r4, 0x1, r2, 0x1) symlinkat(&(0x7f0000000040)='.\x00', r0, &(0x7f00000003c0)='./file0\x00') 13:02:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[]}) 13:02:37 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:37 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x20000008) 13:02:37 executing program 2 (fault-call:1 fault-nth:0): r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:02:37 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:37 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x80, 0x0) fcntl$dupfd(r1, 0x406, r0) 13:02:37 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x2, 0x0, 0x0) 13:02:37 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[]}) 13:02:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x30000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xec, r2, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_LINK={0xcc, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffffffffffb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x36}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5d11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x87}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}]}]}, 0xec}, 0x1, 0x0, 0x0, 0x20008090}, 0x84) [ 258.833660][T20172] FAULT_INJECTION: forcing a failure. [ 258.833660][T20172] name failslab, interval 1, probability 0, space 0, times 0 [ 258.899550][T20172] CPU: 0 PID: 20172 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 258.908685][T20172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 258.918774][T20172] Call Trace: [ 258.922081][T20172] dump_stack+0x172/0x1f0 [ 258.926424][T20172] should_fail.cold+0xa/0x15 [ 258.931036][T20172] ? fault_create_debugfs_attr+0x180/0x180 [ 258.936856][T20172] ? ___might_sleep+0x163/0x280 [ 258.941719][T20172] __should_failslab+0x121/0x190 [ 258.946665][T20172] should_failslab+0x9/0x14 [ 258.951175][T20172] __kmalloc+0x2e0/0x770 [ 258.955423][T20172] ? mark_held_locks+0xf0/0xf0 [ 258.960193][T20172] ? _parse_integer+0x190/0x190 [ 258.965066][T20172] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 258.970808][T20172] tomoyo_realpath_from_path+0xcd/0x7b0 [ 258.976359][T20172] ? tomoyo_path_number_perm+0x193/0x520 [ 258.982001][T20172] tomoyo_path_number_perm+0x1dd/0x520 [ 258.987463][T20172] ? tomoyo_path_number_perm+0x193/0x520 [ 258.993104][T20172] ? tomoyo_execute_permission+0x4a0/0x4a0 13:02:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x8802, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000100)) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x20000, 0x0) ioctl$SIOCRSGL2CALL(r2, 0x89e5, &(0x7f0000000080)=@null) 13:02:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x80000, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000200)={0x2, 0x0, [{0x10000, 0xf3, &(0x7f0000000080)=""/243}, {0x7000, 0x6e, &(0x7f0000000180)=""/110}]}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) [ 258.997342][T20190] QAT: Invalid ioctl [ 258.998922][T20172] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 258.998944][T20172] ? __kasan_check_read+0x11/0x20 [ 258.998968][T20172] ? __fget+0x384/0x560 [ 259.008112][T20191] QAT: Invalid ioctl [ 259.009098][T20172] ? ksys_dup3+0x3e0/0x3e0 [ 259.009115][T20172] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 259.009139][T20172] ? fput_many+0x12c/0x1a0 [ 259.037224][T20172] tomoyo_file_ioctl+0x23/0x30 [ 259.042002][T20172] security_file_ioctl+0x77/0xc0 13:02:38 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x6, 0x0, 0x0) 13:02:38 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 259.046947][T20172] ksys_ioctl+0x57/0xd0 [ 259.051106][T20172] __x64_sys_ioctl+0x73/0xb0 [ 259.055702][T20172] do_syscall_64+0xfa/0x760 [ 259.060217][T20172] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.066114][T20172] RIP: 0033:0x459829 [ 259.070017][T20172] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 259.089626][T20172] RSP: 002b:00007fce99c02c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:02:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[]}) [ 259.098043][T20172] RAX: ffffffffffffffda RBX: 00007fce99c02c90 RCX: 0000000000459829 [ 259.106009][T20172] RDX: 00000000200000c0 RSI: 0000000050009404 RDI: 0000000000000003 [ 259.113976][T20172] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 259.113983][T20172] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce99c036d4 [ 259.113990][T20172] R13: 00000000004cd130 R14: 00000000004d4a50 R15: 0000000000000004 13:02:38 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$ax25(r0, &(0x7f00000001c0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x8}, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default]}, 0x48) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000000c0)) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x4, 0x7f, 0x5}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000080)) [ 259.204791][T20172] ERROR: Out of memory at tomoyo_realpath_from_path. 13:02:38 executing program 4: syz_mount_image$hfs(&(0x7f0000000040)='hfs\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="ffee8ba1ef8aded80334ee17344a0fffeb7799f8d27fb79b9ba2228a8ace3f3d6bd1ad016bca7a557f53393c9e6c90c5b40cda44d376dd32968105c7e66ccbd5c10d8765f565be547487950d18b4539bd9662a5064703446977ea85f6e8e7d9be3133381fb3dc4177f790b9dc1a7a1d34c10d3a4bc4d2b946b573d2abc1e25382c7b3fe7dfe85fcc71539d16679dec24f26e2af37184941f25f87ac97eed62031f206e856ee70f2c4921d654d1a45ca75e408ed767361c018426fd9dea711b5b03674ccb5d4d36d4da08a8d0b988c5a7e9a6975700a2bf8fe995792cc30ec5fb6687719d89", 0xe5, 0x7}], 0x100010, &(0x7f0000000200)={[{@codepage={'codepage', 0x3d, 'iso8859-4'}}, {@file_umask={'file_umask', 0x3d, 0x8}}, {@dir_umask={'dir_umask', 0x3d, 0x4}}, {@type={'type', 0x3d, "56b9f7cd"}}, {@file_umask={'file_umask', 0x3d, 0x3}}], [{@permit_directio='permit_directio'}, {@obj_role={'obj_role'}}, {@dont_appraise='dont_appraise'}]}) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:38 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x300, 0x0, 0x0) 13:02:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[]}) 13:02:38 executing program 2 (fault-call:1 fault-nth:1): r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:02:38 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:38 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x7) [ 259.402716][T20225] FAULT_INJECTION: forcing a failure. [ 259.402716][T20225] name failslab, interval 1, probability 0, space 0, times 0 13:02:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[]}) [ 259.449953][T20229] overlayfs: missing 'lowerdir' 13:02:38 executing program 0: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000000)={0x2, 0x10000000000000}) 13:02:38 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040), 0x8) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4000) r2 = dup2(r0, r0) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000000)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) bind$bt_rfcomm(r1, &(0x7f00000000c0)={0x1f, {0x6, 0xffff, 0x5, 0x0, 0x6, 0x1f}, 0x100}, 0xa) [ 259.571800][T20225] CPU: 1 PID: 20225 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 259.581034][T20225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 259.591104][T20225] Call Trace: [ 259.594423][T20225] dump_stack+0x172/0x1f0 [ 259.598790][T20225] should_fail.cold+0xa/0x15 [ 259.603418][T20225] ? fault_create_debugfs_attr+0x180/0x180 [ 259.609709][T20225] ? ___might_sleep+0x163/0x280 [ 259.614604][T20225] __should_failslab+0x121/0x190 [ 259.619558][T20225] should_failslab+0x9/0x14 [ 259.624074][T20225] __kmalloc+0x2e0/0x770 [ 259.628333][T20225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.634589][T20225] ? d_absolute_path+0x11b/0x170 [ 259.639541][T20225] ? __d_path+0x140/0x140 [ 259.643884][T20225] ? tomoyo_encode2.part.0+0xf5/0x400 [ 259.649284][T20225] tomoyo_encode2.part.0+0xf5/0x400 [ 259.654510][T20225] tomoyo_encode+0x2b/0x50 [ 259.658969][T20225] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 259.664646][T20225] tomoyo_path_number_perm+0x1dd/0x520 [ 259.670116][T20225] ? tomoyo_path_number_perm+0x193/0x520 [ 259.676266][T20225] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 259.682094][T20225] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 259.689322][T20225] ? __kasan_check_read+0x11/0x20 [ 259.694371][T20225] ? __fget+0x384/0x560 [ 259.698628][T20225] ? ksys_dup3+0x3e0/0x3e0 [ 259.703057][T20225] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 259.709313][T20225] ? fput_many+0x12c/0x1a0 [ 259.713739][T20225] tomoyo_file_ioctl+0x23/0x30 [ 259.718515][T20225] security_file_ioctl+0x77/0xc0 [ 259.723464][T20225] ksys_ioctl+0x57/0xd0 [ 259.727650][T20225] __x64_sys_ioctl+0x73/0xb0 [ 259.732261][T20225] do_syscall_64+0xfa/0x760 [ 259.736794][T20225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 259.742719][T20225] RIP: 0033:0x459829 [ 259.746617][T20225] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:02:38 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:38 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x700) 13:02:38 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[]}) [ 259.766225][T20225] RSP: 002b:00007fce99c02c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 259.774660][T20225] RAX: ffffffffffffffda RBX: 00007fce99c02c90 RCX: 0000000000459829 [ 259.782640][T20225] RDX: 00000000200000c0 RSI: 0000000050009404 RDI: 0000000000000003 [ 259.782647][T20225] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 259.782654][T20225] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce99c036d4 [ 259.782661][T20225] R13: 00000000004cd130 R14: 00000000004d4a50 R15: 0000000000000004 [ 259.850289][T20225] ERROR: Out of memory at tomoyo_realpath_from_path. 13:02:39 executing program 2 (fault-call:1 fault-nth:2): r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:02:39 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x183800, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000001c0)={0xfff, 0x2b1, 0x200, 0x6, 0x1, 0x39d0, 0x0, 0x0, 0x0}, &(0x7f0000000200)=0x20) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000240)={0x100, 0x0, 0x8, 0x5, r1}, 0x10) r2 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$KIOCSOUND(0xffffffffffffffff, 0x4b2f, 0x401) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000000), 0x8) ioctl$sock_proto_private(r2, 0x89e9, &(0x7f0000000080)="72189239b01865adb0c299fa8d874f50372cf8d0daebede655853b27452e9f6b895fde6db352f941d6e3bb5cba510f399f7d06342d7110b4318ad4cfa647b8ab80920d061439ab9c48e8f7bf3d0b38f68b4a1bbd4736ab3aef6407ab089f558d380b2356aa780e815b95a30b8e3c5e04aca121ae844781c1adab349852583f73617139f67914af72bccd760658b9bb41e76ee299bfcd") ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000010c0)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000001100)={r3, 0x1, 0x6, @link_local}, 0x10) r4 = socket$inet_sctp(0x2, 0x1, 0x84) ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000000180)={0x34, 0x0, &(0x7f0000000140)}) r5 = getpgrp(0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000280)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@initdev}}, &(0x7f0000000380)=0xe8) mount$overlay(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='overlay\x00', 0x200800, &(0x7f0000000540)={[{@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@metacopy_off='metacopy=off'}], [{@audit='audit'}, {@permit_directio='permit_directio'}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@subj_role={'subj_role', 0x3d, 'team0\x00'}}]}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000480)={r5, r6, r7}, 0xc) 13:02:39 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) syz_mount_image$nfs(&(0x7f0000000000)='nfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x2, &(0x7f0000000100)=[{&(0x7f00000001c0)="649b90e8a7d15e38b56eefe43c0990306b38064642aa76a475f1c52fa5313a60c87a852f92846fc581840ce2375b3f17516f6ca4e8373790f5428771edd9702d3e67631e816b33b7ac4608c4ba285af1e9cc08b7453bac12ad75efba90e05c9827dc52978368733225d14d7c9702ade977fdf99aaf3ab6ac4bb74c5050ca609f0b7bfa08b164af40279d81a7002b27d0c16db18e21b83f66051ec81074e1e328bc8e03d9eb1187db1886bdb11addb1ee40eb323f56229d22d328d74bacda470e4839261137e04b0a99ce78ac5c79a15e9d595a0aa4", 0xd5, 0xfffffffffffffff9}, {&(0x7f00000002c0)="81ca9582257cdbece7d0131ef68954eb8d1b5081e1922694c4fbe36c6a03a752a798de13d3ac567c920b5d91353e739cb1354d0d248d57784d5bbe974a44e4ebbcef4ff4eb9e6610db4279702fcd97a321110ea7af9a643596ecf3a94b49ea5a2c7a063a88381a10b044b0b665b2316c91a9ce63c4813d4702759b53ece0d5b4e1bcecc0726e71d6f112a339a20d5720df405c57", 0x94, 0x6}], 0x100000, &(0x7f0000000380)='/dev/btrfs-control\x00') [ 259.953255][T20258] overlayfs: missing 'lowerdir' 13:02:39 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x7000000) 13:02:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[]}) 13:02:39 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) [ 260.044558][T20275] FAULT_INJECTION: forcing a failure. [ 260.044558][T20275] name failslab, interval 1, probability 0, space 0, times 0 [ 260.075419][T20275] CPU: 1 PID: 20275 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 260.084568][T20275] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 13:02:39 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 260.094657][T20275] Call Trace: [ 260.097964][T20275] dump_stack+0x172/0x1f0 [ 260.102320][T20275] should_fail.cold+0xa/0x15 [ 260.106935][T20275] ? fault_create_debugfs_attr+0x180/0x180 [ 260.112788][T20275] ? ___might_sleep+0x163/0x280 [ 260.117660][T20275] __should_failslab+0x121/0x190 [ 260.122613][T20275] should_failslab+0x9/0x14 [ 260.127132][T20275] __kmalloc+0x2e0/0x770 [ 260.131399][T20275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.137655][T20275] ? d_absolute_path+0x11b/0x170 13:02:39 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x700000000000000) [ 260.142608][T20275] ? __d_path+0x140/0x140 [ 260.146952][T20275] ? tomoyo_encode2.part.0+0xf5/0x400 [ 260.152345][T20275] tomoyo_encode2.part.0+0xf5/0x400 [ 260.157562][T20275] tomoyo_encode+0x2b/0x50 [ 260.161988][T20275] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 260.167638][T20275] tomoyo_path_number_perm+0x1dd/0x520 [ 260.173085][T20275] ? tomoyo_path_number_perm+0x193/0x520 [ 260.178925][T20275] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 260.184742][T20275] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.190982][T20275] ? __kasan_check_read+0x11/0x20 [ 260.196016][T20275] ? __fget+0x384/0x560 [ 260.200195][T20275] ? ksys_dup3+0x3e0/0x3e0 [ 260.204610][T20275] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 260.210925][T20275] ? fput_many+0x12c/0x1a0 [ 260.215337][T20275] tomoyo_file_ioctl+0x23/0x30 [ 260.220103][T20275] security_file_ioctl+0x77/0xc0 [ 260.225038][T20275] ksys_ioctl+0x57/0xd0 [ 260.229179][T20275] __x64_sys_ioctl+0x73/0xb0 [ 260.233757][T20275] do_syscall_64+0xfa/0x760 [ 260.238261][T20275] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.244155][T20275] RIP: 0033:0x459829 [ 260.248047][T20275] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.267638][T20275] RSP: 002b:00007fce99c02c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 260.276041][T20275] RAX: ffffffffffffffda RBX: 00007fce99c02c90 RCX: 0000000000459829 [ 260.284011][T20275] RDX: 00000000200000c0 RSI: 0000000050009404 RDI: 0000000000000003 [ 260.291996][T20275] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 260.299966][T20275] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce99c036d4 [ 260.307971][T20275] R13: 00000000004cd130 R14: 00000000004d4a50 R15: 0000000000000004 [ 260.316425][T20275] ERROR: Out of memory at tomoyo_realpath_from_path. 13:02:39 executing program 2 (fault-call:1 fault-nth:3): r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:02:39 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x80000, 0x0) r2 = getuid() getresgid(&(0x7f0000000240), &(0x7f0000000280)=0x0, &(0x7f00000002c0)) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuseblk\x00', 0x40, &(0x7f0000000300)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read'}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}], [{@pcr={'pcr', 0x3d, 0x9}}]}}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r4 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x100, 0x410840) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r4, 0xc0bc5310, &(0x7f0000000080)) 13:02:39 executing program 1: setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000)=0xfffffffffffffffe, 0x8) 13:02:39 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[]}) 13:02:39 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x0, 0x0) gettid() write$P9_RFSYNC(r0, &(0x7f0000000040)={0x7, 0x33, 0x1}, 0x7) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000000)) write$P9_RREAD(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0xaa) socket$nl_route(0x10, 0x3, 0x0) [ 260.569138][T20302] FAULT_INJECTION: forcing a failure. [ 260.569138][T20302] name failslab, interval 1, probability 0, space 0, times 0 [ 260.580883][T20294] overlayfs: missing 'lowerdir' [ 260.649748][T20302] CPU: 0 PID: 20302 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 260.658897][T20302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 260.668973][T20302] Call Trace: [ 260.673206][T20302] dump_stack+0x172/0x1f0 [ 260.677545][T20302] should_fail.cold+0xa/0x15 [ 260.677561][T20302] ? fault_create_debugfs_attr+0x180/0x180 [ 260.677576][T20302] ? page_to_nid.part.0+0x20/0x20 [ 260.677590][T20302] ? ___might_sleep+0x163/0x280 [ 260.677613][T20302] __should_failslab+0x121/0x190 [ 260.702770][T20302] should_failslab+0x9/0x14 [ 260.707289][T20302] __kmalloc_track_caller+0x2dc/0x760 [ 260.712663][T20302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.718899][T20302] ? security_capable+0x95/0xc0 [ 260.718915][T20302] ? btrfs_control_ioctl+0x44/0x2d0 [ 260.718931][T20302] memdup_user+0x26/0xb0 [ 260.718951][T20302] btrfs_control_ioctl+0x44/0x2d0 [ 260.738236][T20302] ? btrfs_show_options+0xf60/0xf60 [ 260.743444][T20302] do_vfs_ioctl+0xdb6/0x13e0 [ 260.743467][T20302] ? ioctl_preallocate+0x210/0x210 [ 260.754997][T20302] ? __fget+0x384/0x560 [ 260.759166][T20302] ? ksys_dup3+0x3e0/0x3e0 [ 260.763596][T20302] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 260.769852][T20302] ? fput_many+0x12c/0x1a0 [ 260.774279][T20302] ? tomoyo_file_ioctl+0x23/0x30 [ 260.779229][T20302] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 260.785481][T20302] ? security_file_ioctl+0x8d/0xc0 [ 260.790607][T20302] ksys_ioctl+0xab/0xd0 [ 260.794807][T20302] __x64_sys_ioctl+0x73/0xb0 13:02:39 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) io_setup(0x8, &(0x7f0000000000)=0x0) io_getevents(r1, 0x3, 0x177, &(0x7f0000000040)=[{}, {}, {}, {}], &(0x7f00000000c0)) 13:02:39 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x0) stat(&(0x7f0000000080)='./bus\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r1) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:39 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x500, 0x0) bind$rds(r0, &(0x7f00000001c0)={0x2, 0x4e21, @empty}, 0x10) r1 = accept$inet(0xffffffffffffffff, 0x0, &(0x7f0000000000)) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in6={0xa, 0x4e22, 0x3f, @empty, 0x2}, @in6={0xa, 0x4e20, 0x1, @mcast2, 0xffff}, @in6={0xa, 0x4e22, 0x0, @remote, 0x3}, @in6={0xa, 0x4e21, 0x6, @rand_addr="a87d62cba3a389718e98ff221891af39"}, @in={0x2, 0x4e23, @loopback}, @in={0x2, 0x4e21, @loopback}, @in={0x2, 0x4e21, @rand_addr=0x135}, @in={0x2, 0x4e20, @remote}, @in6={0xa, 0x4e22, 0x3, @rand_addr="16913c6c74cb70ddc88fdd26b88761e8", 0x100000000}, @in={0x2, 0x4e20, @local}], 0xdc) [ 260.799408][T20302] do_syscall_64+0xfa/0x760 [ 260.803917][T20302] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 260.809820][T20302] RIP: 0033:0x459829 [ 260.813730][T20302] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 260.833341][T20302] RSP: 002b:00007fce99c02c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 260.841844][T20302] RAX: ffffffffffffffda RBX: 00007fce99c02c90 RCX: 0000000000459829 13:02:40 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000000)={'veth1_to_bridge\x00', {0x2, 0x4e20, @rand_addr=0x401}}) perf_event_open(&(0x7f0000000140)={0x6, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x853d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:40 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 260.841852][T20302] RDX: 00000000200000c0 RSI: 0000000050009404 RDI: 0000000000000003 [ 260.841858][T20302] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 260.841864][T20302] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce99c036d4 [ 260.841871][T20302] R13: 00000000004cd130 R14: 00000000004d4a50 R15: 0000000000000004 13:02:40 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000000)={0x20000000, 0x3, 0x1b}) 13:02:40 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:40 executing program 2 (fault-call:1 fault-nth:4): r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:02:40 executing program 1: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = getpgid(r0) sched_setattr(r1, &(0x7f0000000000)={0x30, 0x5, 0x1, 0x5, 0x20, 0x80000001, 0x408, 0x5}, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r3, 0xc0505510, &(0x7f0000000100)) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r2, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x1000, "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"}, &(0x7f0000000080)=0x1008) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000000c0)=ANY=[@ANYRES32=r4, @ANYBLOB="0000050000fcf30204ff00000900"], 0x12) 13:02:40 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080)=0xfff, 0xffffffffffffff4e) [ 261.163607][T20439] overlayfs: missing 'workdir' 13:02:40 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)={0x0, 0x800}) 13:02:40 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 261.209206][T20458] FAULT_INJECTION: forcing a failure. [ 261.209206][T20458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 261.222438][T20458] CPU: 1 PID: 20458 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 261.231556][T20458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 261.241621][T20458] Call Trace: [ 261.244928][T20458] dump_stack+0x172/0x1f0 [ 261.249269][T20458] should_fail.cold+0xa/0x15 [ 261.253909][T20458] ? fault_create_debugfs_attr+0x180/0x180 [ 261.259724][T20458] ? lock_downgrade+0x920/0x920 [ 261.264582][T20458] ? rwlock_bug.part.0+0x90/0x90 [ 261.269529][T20458] ? debug_check_no_obj_freed+0xc0/0x43f [ 261.275177][T20458] should_fail_alloc_page+0x50/0x60 [ 261.280380][T20458] __alloc_pages_nodemask+0x1a1/0x900 [ 261.285756][T20458] ? __kasan_check_read+0x11/0x20 [ 261.290791][T20458] ? __alloc_pages_slowpath+0x2530/0x2530 [ 261.296631][T20458] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 261.302267][T20458] ? __kasan_check_read+0x11/0x20 [ 261.307317][T20458] ? fault_create_debugfs_attr+0x180/0x180 [ 261.313139][T20458] cache_grow_begin+0x90/0xd20 [ 261.317912][T20458] ? memdup_user+0x26/0xb0 [ 261.322340][T20458] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 261.328770][T20458] __kmalloc_track_caller+0x6a2/0x760 [ 261.334164][T20458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.340427][T20458] ? btrfs_control_ioctl+0x44/0x2d0 [ 261.345650][T20458] memdup_user+0x26/0xb0 [ 261.349913][T20458] btrfs_control_ioctl+0x44/0x2d0 [ 261.354955][T20458] ? btrfs_show_options+0xf60/0xf60 [ 261.360171][T20458] do_vfs_ioctl+0xdb6/0x13e0 [ 261.364776][T20458] ? ioctl_preallocate+0x210/0x210 [ 261.369896][T20458] ? __fget+0x384/0x560 [ 261.374113][T20458] ? ksys_dup3+0x3e0/0x3e0 [ 261.378583][T20458] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 261.384838][T20458] ? fput_many+0x12c/0x1a0 [ 261.389270][T20458] ? tomoyo_file_ioctl+0x23/0x30 [ 261.394230][T20458] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 261.400489][T20458] ? security_file_ioctl+0x8d/0xc0 [ 261.405662][T20458] ksys_ioctl+0xab/0xd0 [ 261.409843][T20458] __x64_sys_ioctl+0x73/0xb0 [ 261.414459][T20458] do_syscall_64+0xfa/0x760 [ 261.419013][T20458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 261.424914][T20458] RIP: 0033:0x459829 [ 261.428821][T20458] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 261.448430][T20458] RSP: 002b:00007fce99c02c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 13:02:40 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040)=0xfffffffffffffffd, 0x5) msgget(0x1, 0x444) [ 261.456863][T20458] RAX: ffffffffffffffda RBX: 00007fce99c02c90 RCX: 0000000000459829 [ 261.464856][T20458] RDX: 00000000200000c0 RSI: 0000000050009404 RDI: 0000000000000003 [ 261.472840][T20458] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 261.480817][T20458] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fce99c036d4 [ 261.488797][T20458] R13: 00000000004cd130 R14: 00000000004d4a50 R15: 0000000000000004 13:02:40 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 261.580918][T20561] overlayfs: missing 'workdir' 13:02:40 executing program 1: sched_yield() r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:40 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x401, 0x20200) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="72617700000000000000000000000000000000000000000000000000000000000500"/113], 0x78) 13:02:40 executing program 2 (fault-call:1 fault-nth:5): r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:02:40 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:40 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:40 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x41, 0x0) syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x40, 0x18002) ioctl$TCGETX(r1, 0x5432, &(0x7f00000001c0)) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f00000000c0)={0x5, 0x6, 0x1, 0xb2, 0x7}) fsetxattr$security_smack_entry(r1, &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f0000000180)='/dev/dlm-monitor\x00', 0x11, 0x3) ioctl$VIDIOC_S_SELECTION(r1, 0xc040565f, &(0x7f0000000140)={0x6, 0x3, 0x1, {0x45, 0x6f8c, 0x20000000004, 0x2}}) 13:02:40 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x400, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:41 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x8035) 13:02:41 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:02:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 261.972489][T20689] overlayfs: missing 'workdir' 13:02:41 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000100)={0x7, 0x80000000}) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000040)=""/140) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:41 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = dup(r0) connect$x25(r1, &(0x7f00000001c0)={0x9, @null=' \x00'}, 0x12) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000540)=ANY=[@ANYBLOB="00fbdb0007cc8b6a3f13336d222aa71cc8deb11fe56a710fedddf633285baec31e6f201b3d01a19054fa02f542f1f0f07f9cded4ad94404402b27a368993e10bef3820bf4dd8514e75d6c83528551f2d4e47fcdf6320ed2bcf592bb4868ce410564d1a37cc7bce47cd4c047b5ec6eea8a6e6309f4e65cb56594b34481b0519da3afe6af709af08530ed54fa6e90f0fee305905ab5e109fa840a42eb2a6b06ed36af0dfaf273db3caaa945546a1b7cbb0b81607228c0f17943aafb88cec159d2b6bc789357ba18ad0727e74eb8d69e7c26d67750539ae39d080e1d75d09000000000000004cd8a2ecddec717150d8408f40312242181c48dd63865d234874b7258b71b71a389d84c361fa292bb6a8eb07b0dbb64288ed8fa0a19baa80d267b741cf2fd2d4c7f4def5ca35d88bc1c8174d1a177b0029cd3914d902e6f3a9f202aa218920eef1dd010c9ee4a90a1c0a70dba18d374be4ea5dd4534d55a8dc5211b746ab269f4e3e320e1990573667032425b930cb208ad05a86393a76d4d11267ae91fe2be90f1cc1055996a6717ca05bc77313fdf15ac21209e78e5fcef19ee35fedf70c1c281e8d2b37f17112b41f22b208d5606a428c26cf5614e65a666fa2d95a890a02775c84f686c98ab8e98de1a786660b4d0c8caf5179d1e43b3318840a0d385cff6532d0ddb5fc283debeea4cca874fc82ba760308f761de7910df97a81bdee89d7a0da0c093879afb"], 0xdb, 0x3) fcntl$notify(r0, 0x402, 0x8000002a) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/autofs\x00', 0x101002, 0x0) sendmsg$tipc(r2, &(0x7f00000002c0)={&(0x7f0000000200)=@name={0x1e, 0x2, 0x1, {{0x43, 0x1}, 0x3}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000240)="a5678e4ca2f428c4813ff05e1e4bbaf79a605dcc", 0x14}], 0x1, 0x0, 0x0, 0x48084}, 0x4000014) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x800, 0x4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00'}) sendmsg$nl_netfilter(r2, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000780)={0x1238, 0x3, 0x8, 0x11, 0x70bd25, 0x25dfdbff, {0x1, 0x0, 0x2}, [@nested={0x10b0, 0x5, [@generic="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", @typed={0x8, 0x10, @fd=r3}, @typed={0x8, 0x7f, @fd=r0}, @typed={0x8, 0x54, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="0ec3282fb593d89d6bdf1c0d919a015cdc089eb77017e3cd308fbf37c7a75cf8b46f9600edd300186275d5ae59111d433c6aaa853d110d1783affc3ba4738a5326150a074ef31bf0c9bc9df24c70ff686d1b2b5271bcf7a5f2f9efe0da002ff59ba8dff9bcad33af622b1f8a427b5d810752908b5ddbd54f006ef34e53a89ddff6039bfda6", @typed={0xc, 0x50, @u64=0x7}]}, @nested={0x174, 0x86, [@typed={0x8, 0x1b, @ipv4=@empty}, @generic="331689fa00e0322a9ed6716b985510ae5dcc4a8de2ec6401cc347d05d872d621f15f8c0607810988a9d43cf4cd0e963825983e8b19a586deb189a3dc2cfa5cd7a1a0af35b8fa9aecfb143ab6c284e338ab2ea6a94a94d02515d9360ac177bcbca56f32a6f076e2e2f8289caa53ab775be9addce2008277706c8355930d3a8d213cbbdf39c9910ca6b56e72a44ad154f09d8d3bc96f68a9625c5091c737b1df600acb755ab62646adf779124a8019ef2fabb78f8ae0617fe5b1", @generic="ec2d5d0326040fcde5c4f8a49f8e83f133a3bd9d5990df9956b995fb47ded7eb2127e23c4e1840f80d259a883bc7ca97a681fa1ac5250979e83ef92f4213040d49ae17e0a8a21e99d825d063c3fb9cfb84189a4c000ea319763fd9beeabaae5149477ee80e46149e6a603817caef89725c409c640faf2c35b26a92faa3ab1e168ae0dd76a86c9664f5ca455d4688c9a3dbb29eea65d0cbfd2edcfc41927b6e11700c4d5b0049c6bf8b2c10f325e3d3"]}]}, 0x1238}, 0x1, 0x0, 0x0, 0x50}, 0x1) 13:02:41 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:41 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:41 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:41 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x4000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x14200, 0x0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x172) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000080)) 13:02:41 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x2, &(0x7f00000000c0)) [ 262.272640][T20822] overlayfs: missing 'lowerdir' 13:02:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:41 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:41 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f00000001c0)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x713e9feb87db4c0b, @my=0x1}, 0x10) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f0000000080)) 13:02:41 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x10, &(0x7f00000000c0)) 13:02:41 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000040)=0x642470a9) 13:02:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:41 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x1278, &(0x7f00000000c0)) 13:02:41 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x1f, 0x40200) write$UHID_CREATE(r1, &(0x7f0000000100)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000040)=""/181, 0xb5, 0xd2, 0x6, 0xc3ac, 0x9, 0x2489}, 0x120) [ 262.570255][T20916] overlayfs: missing 'lowerdir' 13:02:41 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) timer_create(0x6, &(0x7f0000000180)={0x0, 0x2b, 0x0, @thr={&(0x7f0000000040)="3235fabffd157c9d80afeeaf51d2d2e6999ceae481c2fbc6593e629c5d3f567e05a5bdd2a191fe73d9", &(0x7f0000000080)="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"}}, &(0x7f00000001c0)) socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:41 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x9dda) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000080)={0x83, 0x6}) 13:02:41 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:41 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:41 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4c01, &(0x7f00000000c0)) 13:02:41 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x3a2045f1bb0e3a21, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000080)=0x2, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000000c0)={0x81, 0x8000, 0x2, 0xffff, 0x0}, &(0x7f0000000100)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000200)={r2, 0xa4, &(0x7f0000000340)=[@in6={0xa, 0x4e20, 0xffffffffffffffe1, @rand_addr="3be94109e407f8ccb11545ecc9256e84", 0x4}, @in6={0xa, 0x4e22, 0x8, @ipv4={[], [], @multicast2}, 0x439a}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e23, 0xff, @ipv4={[], [], @multicast2}, 0x8}, @in={0x2, 0x4e24, @local}, @in={0x2, 0x4e23, @remote}, @in={0x2, 0x4e24, @multicast1}]}, &(0x7f0000000240)=0x10) 13:02:42 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000040)=0x20) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x0) [ 262.901088][T20979] overlayfs: missing 'lowerdir' 13:02:42 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x5421, &(0x7f00000000c0)) 13:02:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:42 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x215, 0x8) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x5, 0x200000) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000080)) 13:02:42 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:42 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000000)={0x3f, 0x1001}) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000080)={0x6, 0x100000000, 0x100, 0x8, 0xc, 0x8}) 13:02:42 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x5450, &(0x7f00000000c0)) 13:02:42 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) 13:02:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:42 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x200, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000005, 0x40010, r1, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0x400000) ioctl$RTC_WIE_OFF(r2, 0x7010) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000000c0)=0x4, 0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040), 0x8) [ 263.226845][T21206] overlayfs: option "workdir=./file1\" is useless in a non-upper mount, ignore 13:02:42 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x5451, &(0x7f00000000c0)) [ 263.287708][T21206] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 13:02:42 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) mmap$perf(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x224ed743c5a80b77, 0x8010, r0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:42 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x5452, &(0x7f00000000c0)) 13:02:42 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = dup3(r0, r0, 0x37b0a7ec59fbecb2) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000240)={0x0, 0x1, 0x3, [0xca0e, 0x1000, 0x1ff]}, &(0x7f0000000280)=0xe) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000002c0)={r2, 0x5d, "5332cd243f1e7f61d1f1f4256de8a7e040e90fc16c7383fabe179f7f7cabbe32619a2468c3839179734decb5ed3c5ffa78d1f6c9b923e250690125168078214721107babacf722d63f9722d23d5de039cb8e977655e63db30155d16bbf"}, &(0x7f0000000340)=0x65) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x100, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)=ANY=[@ANYRES32=0x0, @ANYBLOB="f400000060ba9b0f686c72c5acfe5c6a7e526094a241c8fdf012d6b89ddc3e4c2fbb088e8217f6832bdb53e0ee51711301a439babca0b8e95c6d0e1fad0b0c171256b6f2f6ef0f83075c31d65155c1c849f7f7dde10c260596ef893bf1c7c3b1e95801247457ef8ea3459780f5c0085d93b955218b4d81580d6096b5d69b7cbe742666ee40dcec2a89414097b7984315cc3e89086fac284c61e681cc185ba5841802de6621eca2c732c340d5d656cb05f46258bc5d8d3162903ad2f3400d8d574407ff35fa3364259a38c40cdec9d94fc7e46d6cf0d596659fe33faefaf2c4063d9ba51fece2e30000"], &(0x7f0000000180)=0xfc) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f00000001c0)={r4, 0x8}, &(0x7f0000000200)=0x8) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:42 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:42 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x20, 0x800) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000040)={0x0, 0x401}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x1}, &(0x7f0000000100)=0x8) r2 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, 0x0, 0x1bf) 13:02:42 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000001c0)={0x200, {{0xa, 0x4e23, 0x20, @empty, 0x2}}}, 0x88) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000440)={@in6={{0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x8001}}, 0x0, 0xfff, 0x0, "690e7c44b94b75a22dd637d5bdfc7b285335c8d632eb74f1a0e612ad141a1eef6e07dbb38ad1bc49cef6e127fab8adc3410e49fdc1a256e834b819afd9497ab94fef150c8ac91dfd061edee31c2b8016"}, 0xd8) timer_create(0x4, &(0x7f0000000080)={0x0, 0x2b, 0x2, @thr={&(0x7f0000000280)="ffacc13025e8a2b81ae3e5a2b1d670188d928c7e595732210ad1eae4f3061b7f3ae0adebd0564bd1681ab15419b1784496de3e4bca8f29105bcd27fe3816b9d5885a76791260befe109c8bb95e5d5e19554cf6d2dd6350fbe01b173e2d7893261492cfd773d8eefde76455ca1f94f7301ea0e6e7bf93dceccff922c58c8f72b2ed4ca51f47f872f591d895cac96a6a6388017fc5b1c0e8cfa52f361126b90f83ec818f7fc6235706298cdcc33e4866a73eb7f3898c793c13c40be327931cf173b41c0e38a9f5a7e0027104bb498fddd721d5e8870c06", &(0x7f0000000380)="090262cbbb3790b338246b083dd07c2054f6fa1fdc230995cb0041d7667222ac2ab62d16ee0f989fa9f51df16e0b011a43caf07e3664d5ad0c6f8aed89a2ddeb685c84f634d6626ddd7b416008d1aa3250685a104abee02954c40fe6f4aeabd793e7f9a1666e2f39c18112036be72f170d6db7e7ab6eb9cd745d51f8021904fdf709651fc5db5b7d6e5f0d280012155c33"}}, &(0x7f0000000100)=0x0) timer_delete(r2) 13:02:42 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:42 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x5460, &(0x7f00000000c0)) 13:02:42 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0x4000010, r0, 0x63) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0xfffffffffffffe80) lseek(r0, 0x5f, 0x2) [ 263.630657][T21344] overlayfs: option "workdir=./file1\" is useless in a non-upper mount, ignore [ 263.660928][T21344] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 13:02:42 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 263.873032][T21496] overlayfs: option "workdir=./file1\" is useless in a non-upper mount, ignore [ 263.885739][T21496] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent 13:02:43 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x2, 0xc84, 0x1, r1}, 0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000001c0)={r1, 0xd5}, 0x8) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:43 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x6364, &(0x7f00000000c0)) 13:02:43 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, 0x0, &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:43 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x81) ioctl$KVM_SET_SIGNAL_MASK(r0, 0x4004ae8b, &(0x7f0000000080)={0x1000, "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"}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:43 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x800, 0x181400) ioctl$KVM_SET_CLOCK(r1, 0x4030ae7b, &(0x7f0000000080)={0x8000, 0x7f}) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f00000000c0)={@local}, &(0x7f0000000100)=0x14) ioctl$SCSI_IOCTL_GET_IDLUN(r1, 0x5382, &(0x7f0000000040)) 13:02:43 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x8933, &(0x7f00000000c0)) 13:02:43 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) ioctl$sock_netdev_private(r0, 0x89f9, &(0x7f0000000040)="c94382049e815344c858ca7f2aabda52d0277889489f1d91f311bb830a8ca91dc17dec10d74ef82c0308ec59fbd6b13c53d172ecc3d145fc6ea626c9c830d23b33688d478f3cbc1c87d1222b08550fa1b471a2a15835ee502c63a2763c9f025d6773547f8c514696bee32d4b1598f25f8c433fd2d66d564ecde5717be4145a67053b4f6fd7cd1ece9b94b737a03781b2cbfd613923ffced21c4df7b005dd6b6763ae73964dc83eeec6d824c752eeeb4b0c619bdb155209d0bae3b5ca2c8322aa97d5a4746def91395fb2bec4cd1a4717d92db92d65b1b0959b7bee314d982a95dd6b") 13:02:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 264.152219][T21586] overlayfs: conflicting lowerdir path 13:02:43 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, 0x0, &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:43 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x400454ca, &(0x7f00000000c0)) 13:02:43 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0xfe53) 13:02:43 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0xa000) 13:02:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:43 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x40049409, &(0x7f00000000c0)) 13:02:43 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, 0x0, &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:43 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000040)={0x10, 0xc69, 0x1}) socket$vsock_stream(0x28, 0x1, 0x0) 13:02:43 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r0, &(0x7f00000003c0)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000500)=ANY=[@ANYBLOB="8001000068ee47879f420ea4b2b8a6d3ab0ba2adf691a084b47cabf9bf4784e29cce8d7c4f6e1bd0b30f572a70e7e9915454142dbbdbd5a1000000000000003a09b7b071e8527e1adb840825b307fa0000000000", @ANYRES16=r1, @ANYBLOB="000425bd7000fcdbdf25110000000c0005000800010069620000cc0004000c00010073797a31000000001400010062726f6164636173742d6c696e6b00000c00010073797a31000000002400070008000300de02000008000300fdffffff080002000000000008000400600000000c00010073797a31000000000c00010073797a30000000001c00070008000400030000000800030087cc000008000300020000000c00010073797a31000000000c00010073797a31000000002c000700080001000c000000080001000c000000080004000000000008000200000000000800040006000000300002000800010002000000080002000004000008000100010000000800010000000000080001000200000004000400640007000c000400ffffffff00000000080001007fc2000008000100090000000800010018fcffff08000100030000000c000300796100000000000008000100060000000c00040005000000000000000c00040000000000000000000800010003000000"], 0x180}, 0x1, 0x0, 0x0, 0x4008014}, 0x1) ioctl$EVIOCGUNIQ(r0, 0x80404508, &(0x7f00000001c0)=""/116) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000400)={0x0, 0x0, [], @bt={0x5, 0x288599f1, 0x1e, 0x8, 0x1, 0x0, 0x8, 0xd}}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7) dup2(r0, r2) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f0000000280)={0x10001}) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000080)={0x9}) [ 264.507001][T21714] overlayfs: conflicting lowerdir path 13:02:43 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x3) 13:02:43 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x40086200, &(0x7f00000000c0)) 13:02:43 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[]}) [ 264.771228][T21733] overlayfs: conflicting lowerdir path 13:02:44 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x1, 0x8000) r2 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x7ff, 0x10000) syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x9, 0x40002) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000080)='system@vmnet0trusted\'GPLselinux\x00', &(0x7f00000000c0)='./file0\x00', r2) fsconfig$FSCONFIG_SET_PATH(r2, 0x3, &(0x7f0000000140)='$\x00', &(0x7f0000000180)='./file1\x00', r2) 13:02:44 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 13:02:44 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) move_pages(r1, 0x6, &(0x7f0000000040)=[&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil], &(0x7f0000000080)=[0x7fff, 0x6], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x6) 13:02:44 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r1, &(0x7f00000001c0)=""/225, 0xe1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:44 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x40106439, &(0x7f00000000c0)) 13:02:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[]}) [ 264.983947][T21867] overlayfs: conflicting lowerdir path 13:02:44 executing program 1: setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x5, 0x8000) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={r1, 0x108}, 0x8) 13:02:44 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f00000000c0)=0x8, 0x5) 13:02:44 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x511401, 0x0) ioctl$SIOCRSGL2CALL(r0, 0x89e5, &(0x7f0000000080)=@null) getegid() r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009405, &(0x7f00000000c0)) 13:02:44 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 13:02:44 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4020940d, &(0x7f00000000c0)) 13:02:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[]}) 13:02:44 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) sendto$x25(r1, &(0x7f0000000080)="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", 0x1000, 0x10, &(0x7f0000001080)={0x9, @remote={[], 0x3}}, 0x12) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:44 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x40286608, &(0x7f00000000c0)) 13:02:44 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x2}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) 13:02:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[]}) 13:02:44 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = getpid() wait4(r1, 0x0, 0x1, &(0x7f0000000000)) [ 265.500142][T22047] overlayfs: conflicting lowerdir path 13:02:44 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0) 13:02:44 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000040)={r0}) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080)={0x0, 0xfffffffffffffffe}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={r2, 0x8000, 0x30}, 0xc) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:44 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4048ae9b, &(0x7f00000000c0)) 13:02:44 executing program 0: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, 0x0, &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:44 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[]}) 13:02:44 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000400)={@mcast1, r1}, 0x14) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3, 0x10000) r3 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r2, 0xc1105511, &(0x7f0000000080)={{0x6, 0x0, 0x5, 0x62, 'syz1\x00', 0x8}, 0x6, 0x20, 0x8, r3, 0x4, 0x7fff, 'syz1\x00', &(0x7f0000000040)=[':-\x00', ':%wlan1\x00', '\x00', 'ppp1\x00'], 0x11, [], [0x7, 0x2, 0x9, 0x3]}) r4 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, 0x0, 0x0) 13:02:44 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009402, &(0x7f00000000c0)) 13:02:44 executing program 4: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0xc5ca71fd64ef81b2, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000080)={0x2, 0x5, 0x200, 0x8, 0x1ff, 0xfb3}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000), 0x8) io_setup(0x6, &(0x7f00000000c0)=0x0) io_cancel(r2, &(0x7f0000001100)={0x0, 0x0, 0x0, 0x1, 0x6, r1, &(0x7f0000000100)="a6c3017e3a06ee6431565247ad47a078c33eb6c751d9ee7fbb03bd60358c325581ec970475e93b2dd4a42637dac61292f3028d0c3e174664a80fb7f22e3b2716886ef4a8df9b2de6418fb40b34f56d8c3c78d36df86b18b168d03293c3362b61a58cca672e96a0377cef23eb259c0f5d69c3852d1586883842f92c5f94f24c936b5a1597d9490fbd122a1aa062cac22006ff622e09583b98b7752fdedf0d4fe0a7f313cc564e62f86ccc3c4e632a0043a5c88219954974d2cd9649ffe11f2cb2c0baddb113ecdaff59f80793d4512dddd2e2fd0e602493e717d9a9feeafbdae00ad8e30d16e617f52ba7bd71a20ef0793649de872eb760fcd39c183172f9ae2954fe84faadc76efd438b0cb67d6afc0dcc3dc8dd86b4eae9c72946b68162ce77b10611e69c214194dd50de8b88328a4cd9078bab09035027270296811e84d630f78fbda5b610bf41017c6ba7ae4579939ef000bebaccf79bf9432b788ecfd77887731e78f0f36c3cbc390e66aa82875c07d14bd153238529495d77a244205d9b6d0bbaa85392b7ef3e2e2f7b18a186fba58f0d4ee172566185c267d39b0bf23ade56a20015ad3452ae166fedb4a2ee58231972804fed9d7995f3b545b2fc24150dfc25873f486b28005e1c4d20ded2b7dbc0de0d7d1284b333c31f6a41b8f3385048f699765e3832a427920eb24d3605e21596c2fe9f57168cf6ff2ab824292813fcd551bccc27b6e6a038ece12570657143e6cd508aed772429fdc1b4bd5e9d3a56c6477a757f375643335de5b49a7870ac7e5fd204d5ff446982cc08f1794a643a6f05e17975410c0eb16294d2194d2802575675e8b5bea27b899d1d8ac02057a06e3ac4a93128f24c8ad9bf2e479bb63d3b7052df73283f7a9943f3ddd708489ed5c0ba8e5159ce6f94526857b3519dfa17f9bf99f660fff5205eb73fb80e699a38edea0f5997f03ace9bc809982fb3b1c39b6c2d5f9c23e0aa3223df0393e5ee81a016f0241a68b9dfdbe2c1598dd8932a3a0dc781ad222cbeb13f6c723d11f158b7568cd097de4d64813504d9fa37b37700f1b1f7efa7d405721c022ddef8f6e1ed106097c4e2c9456354b867cff195166b9b309ff54c2fa0190c0ed8301f4ff4fab92b8946702cbcd113e29b31803865266c0d5d9610ff411e59c094a55054b99546eafa01a602db25daf86ab09442c29ebd417648de243f235b42fc6d4badfd051ee3e6f949ae3206071a988d5d207ef5eeaf93f85238030b3b8ea6f9a1c824d892947451791d0522767d29b10fd34adfc40bb6785c65f1b3d63e87aae05ba0ce0a7edaf8dd6a9dcfa331d357fe6a59f3b9e2aa52da1cb25c6a9f811fa3d12ab48fd9691cd5324755b4aa3b0a6531bfd4c49c1a6d77e05b24fb3f5cc798933b7ecdc5b7bfdb52a8d652c56718cd1f3f392aacee56594621008d283eb751dab38cad2604a50617c1ba140a5a51f76a7631daaeda2db8980ef76079ce75cb161d55b407589f53687dc1f7dec5b3f1fd5c720d3ddfbd0a8f97fe89061aeb7977d1db85a44001bea30ef46b8fc576bbe716b7349d0086f8a62c944904207ead6a937e6be5f75ce916102149cba76db0327a4e8f0b5b0a224770e6c465b7d2e42467f86a6ee6e93c8696e9bfd60617a52028f7dc6894b8bbfbea0d14f0c88dec7fd92b59394cc2870dc78586f08bb0ad38b215b6bf3c7d736608bb5964512af76da51e9ceb0a9c9f65f5728bb23b375cde427d940302a9966f763a328cb284a93bf27a6315f5e8dd0c32c47bae90fac2b08cfa18c426b6b5fcb05f150bd4d1b3050c2a488344df9028e2e9092558f169157620b90dc32886b14ae599189d4040790b8d22fec843e69773f0b9b906a708f6512b1c35b47bcc1119bc2d6a1cd7a449b5b2ffded4bd0b6f10cc026201519ef177c28d7d94e7d6c3152af6996ebe6c9cd42618cb62e34f3e09814cb1d31214c3d52fae0bda448c8a301d2f21fcc6bca52c33791952cb37df1883c85f97370a4a4bd306c804f6e97ea4efa9547c576b5eb66ee1d6693aba9621c4057ea15dd0ae1e966ccf822be6c63123c7825dd65dab3dd0f99cb8862ba66c0fd5f1f2af4a766294ce2fe35dd5a271310132abdc0080b6d41209557bc69c91edb85c3ec258f31ab685198e514dcebf090203597156627f9779f2bc042152cc5490e862d33c0cf8c60cf3d61efb43854d898a44fbc394c905f92329995acd06fe90d4230271004dd0293c6c402342bc6f3016819f3b44741ff0d3f590cd74e86c829582eaf6e482df5fed342e042c6f9df5411a522c527d24e992239bff987d293551eb6529e3cdafd5f2f81a7c5e3669fa1b269f283118893607ab2eac0a4b28fbf4d5edc419173a7158d75c5acfdda28ae24a11aedc25d07846c9c299f772107f6fca373f8216ea0ce25d62e1e72a6bc926fd4fc7632c8a7b632c6c41f7e77aef6ff00e09d8f9cddc54a7dacd9b8d30758cc4d7d3b26ecd02b41820e36b8b3108084a51fd2877923ca6c21077b0aaa5dd80e92a42311e73f0d2dc155f155446f98db406a908773556b570306a290d26b9e2135a40e12b95b117907684f0b611ffc4c2a1d905125e09fbccbf08d008388b4259cc3e637ab1e61f25494d5606371dc111434fc83f8ce3178aab8d7dd4fd77566735ef020ecb63a3ccc556e61679c24d328467a2723732acbaa94c497d1742d2912bdf3570efae9e35dfb2ef4fef2300c32e967a5c35bfeb827740c6c6789218cc7a3779cb16184616e2cb6b9cdf048b34e902259eb34d0c2ea086af2268aaed2d37d413a92eb66ec5ada0eb68771c9d3911129c93da9556a8b9f67114169cec36acb3350c72e72e20dfb9e51f56900cc4cf211e86749507ab019e875a35858560b6afb3965969a6e17ca79875b0247fddbad861c88b4372fdc3db90391cc8576412b2e6d971d20e3b9cd7d738e317ac915dd0a276f9c495746519f522b744aba1c2228fda25675e77925c9abdc094c905b1c0581900cb747173180d5f083b763267a6ce5fb87fa01babfe59d265e6da29a342e8c91bbf3ac2c808dc339f030748f61931a86c5a5b45157752480dec65d5022b2c059a2c1ade59216e5e7f06a5a0fe720a994d09b57b4fec2833480e1402c25eba582b044c741a0f3b0991211fde603b804a874571a82d3804d957ba9553571aa2c27e21af89410bd6556293423c62432b26c9e2408455c34199100b72dafac5cb707dcbbe8a7aae9787a939da1d73ab47effeba5fc945f91098daa44fbc9f38c69ea33bc708c264d2033fd721cea41d04eb43ef70de3fbac30b298bb9656deaabb4b5c57ae809386408ad6fdc8364103e6f78aeddb557d1a4272abf8efc9eeb9a2217cb296eee4306409b417ef347e3decb09d2a789d0896c535996ef7ddb701d04b56eefd185d50b7f8c47f9346a856d7d7a324fb046b9beed3364c6a822fc2b8fb167261b4ee67f8ad35045311366a6deebb951642baf28a67c4117e9efc6b2977d64936009cdc026ab9f754af2c56d85bcced112cb0025b4ccde53a34503adb77c34001af476b61b1b2a4bc0328c8b91701c578f3b315ac678635671d2dc9f61e5b464b8c51b8aba2c29d7ec117491e188c3e1a156e64a768c346dc41f984afb3d0be9ff50f51b7942c8d28691b3e1f555110074a9adcc4a1fdc1033e041b1df81999729d4b0cfdaa715c16519a3f61e9be3e559a2ee57ba98b933aba58396b3047f5ade53df2bdaacaf1f44ac5182f38cbdaca61687b9b6651a1e38cca9ab690e7cd06a6560c2881cb0fb012fc2498fd7c3aa8ba85d0eee9738d857050cfb674210a7b5c93cdb7631de0589cab1d651f710dfb977e8a4401f9d56f7f16c7fa6a95f2ac57d380e30e1f3737e8fbe256a161d803f5e62a0250c85c9188cdb8e8844f690991ba734c5b7d3274abd77ab1912d879159146bfc40780ff4eec5f9125be8bfbb0b0a990dacc1e0354e4dd76ed6a9a30b4a4ed4fd3c8402c9a4acbcdbce6d538fbb191efdc97ab12ceff9fe3d140aeb4163854ce7233d71b29a133765f17049a42807f022fdd621972760c677ac1c21eeced164ae0e619f0bc2be41374e95a6e6008397600f373d7a756ed72956e6449a0d86377067ffb6cbe7c73f0252e53c66f0ae88bf88d87e8c356d094ee597e5b0f25286cec14d51669ebdb76fe5451acb3c30c65bb5e74bc3d67437c74151fc5fe866e630635c0daa37464d4ed1c217fcdfc7d293f819e919edad037897950e9fb4ee98c68c7d1714feeadc2dbd806ef06146ae22c6c05ba339efa5809bb94a7d653d99567297e7b4946e9075c8139f3c7fb11d192154cb213b4923d7dde10f0275fd94f0c1ce307f31b9674f352fdfb39816413fa733e8b1e5fb751898ab7e703fcd745bbbbeb4f58d1ad57600641c8a88dee70e99d7f984eb62cc5e67c6e93d573db467b9233d3eb4f166d4c2f267ae30878d1760abd060130bdc59c38cafcc44753b002356137f640a0e8afa157639a95f3ddbace5182fd715e6845362ec86f1dd732abd49ebac90407b01688f0a830c0f5031301d63b2f0de2f912e23aab4fa21bc7fd75921f62c1fdf781f46ffd19deb2480fb5540487f5f65760abc9c79555b5348e5a9fd65d47853a46064abb4e5c1172a818c3d2a111373c9a9f8292976322597a65455dbf4099619a19624970132e4fc7452f0746fb1d3afe6d60f26ab09f51f12f6b44a4803439e6dc09d56d606e0a31ff8f6196b141008b11d23d5a9c218a207f3c5717f9ee40967f1b5102ab309cfd8ee2360dd07cc76a387f565aef4cb3776a9cce85ad47518372781e447f03b6129a9688b7c9c503d7e75fda1fd1574b9ab7365850cdfd7aac7170c6ad56362f48ae472f36962372285d556e9bef63661192ea7b2331e7be7f4ad17148ef2006100ded1031d66b8271d9a7dc96460ad5e92df29367132057e36d509bb488181bba704c39764f339365e53e0fd67d56b8c70b221381fae61b85b47238d27ee0aec21543632c2edc7493c56159e077c8fd877e2f2cbe7c883690eb4b3556a4c8deb7ee2183c402bd0d76badf61cfdf7635858720d37baad00b561fec2eefe8dadfd28fc10a1e75b7beb337c6052357ecd6d10271de5043741cd89200d951c47f4ef7253970f51252f8fb2a27f2a4dc4098c67b0a2c7cf6d7d948a32b47516bc1dfc8c41db08317eac42f93629f7d1ecf10d2f6a189a44d3eb955d5e3995b84e551bfd84254b8081e8705635974c3849cf1ea34fea001e4ee84786926fdfb8a5f4d03902a383250f6ce3aeddea7e423359b9944e0d95f4743b8b197538be50e1780dfa734f4c324d9bc8fae6915e207391b501ba843791637e334bc49d8a5c95a1086198e2085df622b52b47de155a9b08b8260cf0d6834def2fd846e9119d67adcff5db95e3aa1769a18cb969bd7716bc6544a0d8344c2f93e02e6b7f83f812785eada8ca8c8720231b720e78283a51d683972651e51a3b0fec4fdf2146135ca95ef95d512f0887f0ebb5b24973c741df9b33c83f8b18e73ed125e739705d22c08ddf58350289a30d646a99596f8f1bcb20f3408c130b751d1a13968d000ec2800106158373be54dc9ca28123d367d0e05d1fb2f5a4ea649b40720b45b1ff3219980cd6a0b707dab58bdf8c081ed483ed7b8a05eafe579a17941b30c2326e8d948362fcc98a2254b1ba01171735c3c5ab13816ff84c1c19f852e0074166c183781c9984bdeda9d8960418a2ae4c708306ba27095b2516d9de2752425c5d176b0c0996f7101e3d4", 0x1000, 0x40, 0x0, 0x2}, &(0x7f0000001140)) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000001180)="78555e2440f68d75963aef910ded0da2ae8d88e52958ba006453df7d7dd5924c2d1844c42557d38c293251141ec2938f78be10fa07907a3c0552d5e7d4c047fb6e9ce9a7f1bf43777b08b190fec8fefbf8a587f633d8847fd2d08e41d03e2737e8760508673e8c27edc3f9028140a87bb002265bcb016401b5cb052b0b6c246ca19f45df2e125838608ce8158bfae7024857f4fbe94012ecae28079cd551e1c7d03ed10ca4538a41f6f8ab3ed7b971e5e0dea1f184abcdf7418e198a7a6ab78de048a4e98774389b080a22b6c8394cc3c822", 0xd2) recvfrom$x25(r0, &(0x7f0000001280)=""/2, 0x2, 0x2, &(0x7f00000012c0)={0x9, @remote={[], 0x1}}, 0x12) [ 265.772626][T22224] overlayfs: conflicting lowerdir path 13:02:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\a\x00', &(0x7f0000000040)=ANY=[]}) 13:02:45 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:45 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009403, &(0x7f00000000c0)) [ 265.929050][T22236] overlayfs: conflicting lowerdir path 13:02:45 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000040), 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:45 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, 0x0, &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:45 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:45 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x442) accept4$tipc(r1, &(0x7f0000000040)=@name, &(0x7f0000000080)=0x10, 0x80000) 13:02:45 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$PPPIOCSMRU(r0, 0x40047452, &(0x7f0000000080)=0x4173) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0xffffffffffffff6f) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xa0, r1, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x84}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x4}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x88}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8000}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4174}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x270fa0b2d4b9e573, 0x20}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x742086b11fa81841}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xb, 0x2}}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xe}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4810}, 0x200040c0) 13:02:45 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) [ 266.204506][T22363] overlayfs: conflicting lowerdir path 13:02:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00H\x00', &(0x7f0000000040)=ANY=[]}) 13:02:45 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = dup3(r0, r0, 0x80000) write$sndseq(r1, &(0x7f00000000c0)=[{0x0, 0x80, 0x4, 0x40, @time, {0x81, 0x8001}, {0x401, 0x7fffffff}, @ext={0x6f, &(0x7f0000000000)="47b5d1917c927455d678aeca3954b4380b688cd7b0a484a0a0456625385203609a38021918c5b3503b7ee6564da3e7bcbc23c66b87a745eb85e2f3d8a79dedc409c88ba3e3d1ff7e4a264f636770d2b5480070ad2f59c307a116f8d106cd2e2a8e77e7588e9a5bd5e6f1a81353145d"}}, {0x7fff, 0x7f, 0xe9e, 0xffffffffffffffff, @tick=0x9bb0, {0x8, 0x5}, {0x4, 0x3}, @quote={{0xffffffff, 0x1}, 0x6, &(0x7f0000000080)={0x3ff, 0xffffffffffff8000, 0x7fff, 0x3814, @tick=0x3, {0x80000000, 0xffff}, {0x7ff, 0xcb}, @note={0x81, 0x3, 0x3, 0x7, 0x5}}}}, {0x6, 0x8, 0x2, 0x7f, @tick=0x89, {0x81, 0x22b}, {0x4, 0x4}, @connect={{0x2, 0x1}, {0x80000000, 0x100}}}, {0x4, 0x6, 0x13, 0x4, @time, {0x2, 0x100000000}, {0x3, 0x2}, @note={0x1, 0x0, 0x33, 0x1, 0x452}}], 0xc0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:45 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:45 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009406, &(0x7f00000000c0)) 13:02:45 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10) 13:02:45 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00L\x00', &(0x7f0000000040)=ANY=[]}) 13:02:45 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x10001) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, r1, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb27a}]}]}, 0x20}, 0x1, 0x0, 0x0, 0xc000}, 0x800) r2 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, 0x0, 0x0) 13:02:45 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009407, &(0x7f00000000c0)) 13:02:45 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x12) recvfrom$inet6(r1, &(0x7f0000000280)=""/223, 0xdf, 0x2023, &(0x7f00000000c0)={0xa, 0x4e21, 0x6, @empty, 0x400}, 0x1c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1d, 0x3, 0x1, &(0x7f0000000240)) setsockopt$inet_dccp_int(r1, 0x21, 0xf, &(0x7f0000000080)=0x100000001, 0x4) ioctl$UFFDIO_ZEROPAGE(r1, 0xc020aa04, &(0x7f0000000140)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x1}) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0x4) syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') [ 266.642081][T22555] overlayfs: missing 'workdir' 13:02:45 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:45 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00h\x00', &(0x7f0000000040)=ANY=[]}) 13:02:45 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009408, &(0x7f00000000c0)) 13:02:45 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x2, 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000140)) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet6_int(r1, 0x29, 0x400e69c09f106ba0, &(0x7f0000000080), &(0x7f00000000c0)=0x4) prctl$PR_SET_KEEPCAPS(0x8, 0x1) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000), 0x8) getsockname$llc(r1, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @dev}, &(0x7f00000001c0)=0x10) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SCSI_IOCTL_DOORLOCK(r0, 0x5380) 13:02:45 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:46 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) msgget(0x1, 0x44) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:46 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) r2 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00l\x00', &(0x7f0000000040)=ANY=[]}) 13:02:46 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009410, &(0x7f00000000c0)) 13:02:46 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) r2 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:46 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = accept(r0, &(0x7f0000000040)=@sco, &(0x7f00000000c0)=0x80) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000100)={0xb5, 0x201, 0x8, 0xbd8e, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000180)={r2, 0xc96, 0x72}, &(0x7f00000001c0)=0x8) [ 267.101409][T22744] overlayfs: missing 'lowerdir' 13:02:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00t\x00', &(0x7f0000000040)=ANY=[]}) 13:02:46 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0xfffffffffffffec8) 13:02:46 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[]}) 13:02:46 executing program 1: getsockname(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000080)=0x80) bind$ax25(r0, &(0x7f00000000c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x5}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x48) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x0) 13:02:46 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009412, &(0x7f00000000c0)) 13:02:46 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) r2 = getpgrp(0x0) kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:46 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) ioctl$void(r0, 0xc0045878) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x800, 0x0) sendmsg$key(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0xd, 0x2, 0x7, 0x10, 0x0, 0x70bd27, 0x25dfdbfd, [@sadb_x_sa2={0x2, 0x13, 0x59e7, 0x0, 0x0, 0x70bd2a, 0x3505}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e24, 0x6b, @loopback, 0xffffffffffff7e8a}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}}, @sadb_key={0x4, 0x8, 0xa0, 0x0, "0065def8f4df17cc770fcf25f3654f4da027bbc7"}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e20}]}, 0x80}}, 0x4000) 13:02:46 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040), 0x8) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4000) r2 = dup2(r0, r0) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000000)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) bind$bt_rfcomm(r1, &(0x7f00000000c0)={0x1f, {0x6, 0xffff, 0x5, 0x0, 0x6, 0x1f}, 0x100}, 0xa) 13:02:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00z\x00', &(0x7f0000000040)=ANY=[]}) 13:02:46 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x800454d2, &(0x7f00000000c0)) 13:02:46 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:46 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x40000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x270) read(r0, &(0x7f0000000040), 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x2d, 0x1, 0x2e, "c3a82003eb44fd413b7579fe051c6c47", "9211e09cf6c121dee02afc239d443bb6f0e89a79a49322f9"}, 0x2d, 0x3) shutdown(r1, 0x1) r2 = getuid() socket$inet_dccp(0x2, 0x6, 0x0) ioctl$SIOCAX25ADDUID(r1, 0x89e1, &(0x7f0000000040)={0x3, @default, r2}) socket$inet_dccp(0x2, 0x6, 0x0) 13:02:46 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040), 0x8) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4000) r2 = dup2(r0, r0) ioctl$SIOCRSSL2CALL(r2, 0x89e2, &(0x7f0000000000)=@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}) bind$bt_rfcomm(r1, &(0x7f00000000c0)={0x1f, {0x6, 0xffff, 0x5, 0x0, 0x6, 0x1f}, 0x100}, 0xa) 13:02:46 executing program 4: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x400001) getpeername$netrom(r0, &(0x7f0000000040)={{0x3, @netrom}, [@netrom, @netrom, @bcast, @null, @netrom, @default, @default]}, &(0x7f00000000c0)=0x48) socket$vsock_stream(0x28, 0x1, 0x0) syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x9, 0x4000) 13:02:46 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x80086301, &(0x7f00000000c0)) 13:02:46 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[]}) 13:02:46 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x42c3cf62c9617f64) 13:02:46 executing program 3 (fault-call:13 fault-nth:0): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:46 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:47 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x0, 0x40000) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000), 0x8) getsockopt$TIPC_NODE_RECVQ_DEPTH(r0, 0x10f, 0x83, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 13:02:47 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x80247008, &(0x7f00000000c0)) 13:02:47 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x16, 0x101440) getsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000040)=0x8, &(0x7f0000000080)=0x2) 13:02:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[]}) [ 268.032261][T23026] FAULT_INJECTION: forcing a failure. [ 268.032261][T23026] name failslab, interval 1, probability 0, space 0, times 0 [ 268.049889][T23026] CPU: 1 PID: 23026 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 268.059036][T23026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.069107][T23026] Call Trace: [ 268.072461][T23026] dump_stack+0x172/0x1f0 [ 268.076824][T23026] should_fail.cold+0xa/0x15 [ 268.081700][T23026] ? fault_create_debugfs_attr+0x180/0x180 [ 268.087532][T23026] ? page_to_nid.part.0+0x20/0x20 [ 268.092583][T23026] ? ___might_sleep+0x163/0x280 [ 268.097464][T23026] __should_failslab+0x121/0x190 [ 268.102431][T23026] should_failslab+0x9/0x14 [ 268.106953][T23026] __kmalloc_track_caller+0x2dc/0x760 [ 268.112348][T23026] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 268.118605][T23026] ? fput_many+0x12c/0x1a0 [ 268.123043][T23026] ? strndup_user+0x77/0xd0 [ 268.127565][T23026] memdup_user+0x26/0xb0 [ 268.131831][T23026] strndup_user+0x77/0xd0 [ 268.136179][T23026] ksys_mount+0x3c/0x150 [ 268.140442][T23026] __x64_sys_mount+0xbe/0x150 [ 268.145141][T23026] do_syscall_64+0xfa/0x760 [ 268.149678][T23026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.155596][T23026] RIP: 0033:0x459829 [ 268.159498][T23026] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:02:47 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0x6, 0x2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U-', 0x9}, 0xffffffffffffffb3, 0x7) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r1, 0xaead) socketpair(0x9, 0xcc045f6c2f9b9e5e, 0xffffffffffffffff, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$netrom(0x6, 0x5, 0x0) bind$bt_l2cap(r1, &(0x7f0000000400)={0x1f, 0x4, {0x2, 0x0, 0x3, 0x7, 0x9, 0x3f}, 0x8001, 0x1000}, 0xe) setsockopt$inet_MCAST_MSFILTER(r2, 0x0, 0x30, &(0x7f0000000100)=ANY=[@ANYBLOB="070000000000000002004e20ac1414aa000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000001100000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000400000002004e210000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e22ac1e010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002004e23e000000200000000963200"/656], 0x290) 13:02:47 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8, 0x90000) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0xfeec) setsockopt$inet_tcp_buf(r0, 0x6, 0x1c, &(0x7f0000000040)="3c0b1b985095aa20868f7df28b8ea708b60ef3c0aab03500b1548b19bd4f972cdbf314b496127503592fc7b1937b9a476138c54d3427f5fd22744eb42b4e536e1aa480c882b14b39dbdf47b0c8e9a05716601d8ae0c0ed563f199e508507610468c2b53d8ce0e0a13700379d4555fd8124e934beb3504aad6f33fcb2a6b882", 0x7f) 13:02:47 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x80489439, &(0x7f00000000c0)) [ 268.179109][T23026] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 268.187538][T23026] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 268.195554][T23026] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 268.203540][T23026] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 268.211536][T23026] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 268.219521][T23026] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:47 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009405, &(0x7f00000000c0)) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:47 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x7) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:47 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x90009427, &(0x7f00000000c0)) 13:02:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[]}) 13:02:47 executing program 3 (fault-call:13 fault-nth:1): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0xffffffffffffff10) mount$overlay(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x2020, &(0x7f00000000c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_off='nfs_export=off'}, {@nfs_export_off='nfs_export=off'}, {@default_permissions='default_permissions'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}], [{@obj_user={'obj_user', 0x3d, 'keyring('}}]}) 13:02:47 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040)=0xffffffffffffffd7, 0x8) 13:02:47 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:47 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:47 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') [ 268.690316][T23319] FAULT_INJECTION: forcing a failure. [ 268.690316][T23319] name failslab, interval 1, probability 0, space 0, times 0 [ 268.703624][T23319] CPU: 0 PID: 23319 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 268.712761][T23319] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.722857][T23319] Call Trace: [ 268.726165][T23319] dump_stack+0x172/0x1f0 [ 268.730535][T23319] should_fail.cold+0xa/0x15 [ 268.730556][T23319] ? fault_create_debugfs_attr+0x180/0x180 [ 268.730582][T23319] ? page_to_nid.part.0+0x20/0x20 [ 268.746001][T23319] ? ___might_sleep+0x163/0x280 [ 268.750871][T23319] __should_failslab+0x121/0x190 [ 268.755824][T23319] should_failslab+0x9/0x14 [ 268.760338][T23319] __kmalloc_track_caller+0x2dc/0x760 [ 268.765722][T23319] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 268.771973][T23319] ? strndup_user+0x77/0xd0 [ 268.776490][T23319] memdup_user+0x26/0xb0 [ 268.780766][T23319] strndup_user+0x77/0xd0 [ 268.785146][T23319] ksys_mount+0x7b/0x150 [ 268.789406][T23319] __x64_sys_mount+0xbe/0x150 [ 268.794098][T23319] do_syscall_64+0xfa/0x760 [ 268.798623][T23319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.804526][T23319] RIP: 0033:0x459829 [ 268.808433][T23319] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.828302][T23319] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 13:02:47 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[]}) 13:02:47 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = shmget$private(0x0, 0x4000, 0x78000000, &(0x7f0000ffc000/0x4000)=nil) shmctl$SHM_LOCK(r1, 0xb) 13:02:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[]}) 13:02:48 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0045878, &(0x7f00000000c0)) 13:02:48 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x10004, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000040)={0xd2, 0x0, 0x6, 'queue1\x00', 0x100}) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ashmem\x00', 0x80000, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) [ 268.836816][T23319] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 268.844832][T23319] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 268.852827][T23319] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 268.860915][T23319] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 268.868894][T23319] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:48 executing program 3 (fault-call:13 fault-nth:2): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:48 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000000)={r0, 0xffffffffffffffff, 0x3}) 13:02:48 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) pipe2(&(0x7f0000000500)={0xffffffffffffffff}, 0x80000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000580)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r1, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0xd097eb4c05510173}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x24, r2, 0x200, 0x70bd28, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x328}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8004}, 0x8000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:48 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0184900, &(0x7f00000000c0)) 13:02:48 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000000)={r0, 0xffffffffffffffff, 0x3}) 13:02:48 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x8, 0x3, [0x1, 0x6, 0x3]}, &(0x7f0000000080)=0xe) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000100)={r1, 0x3c, &(0x7f00000000c0)=[@in={0x2, 0x4e20, @broadcast}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e23, 0x8ef, @rand_addr="a2b192dfe41be47282308ca749571a88", 0x4}]}, &(0x7f0000000140)=0x10) r2 = socket$vsock_stream(0x28, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="0f42", 0x2) r3 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r4 = ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000740)={0x0, 0x2, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) r5 = ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) write$UHID_INPUT2(0xffffffffffffffff, &(0x7f0000000540)={0xc, 0x1, "ab"}, 0x7) ioctl$KVM_SET_USER_MEMORY_REGION(r4, 0x4020ae46, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB="d8", @ANYBLOB="000000000000fbdbdf250f000000080002000400040008000600040002001c000200080001000000000004000400080002000000000004000400700004000c00070008000300000000003c00070008000400040010000000010000000000080001000000000008000100000000000800010004000000080002"], 0x2}}, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0xfb]}) ioctl$KVM_RUN(r5, 0xae80, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f00000005c0)="0032d57b9a2d2fca89", 0x9) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x90}, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r5, 0x4090ae82, &(0x7f0000000380)) ioctl$KVM_RUN(r5, 0xae80, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, 0x0, 0x0) 13:02:48 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080), 0x5) 13:02:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[]}) 13:02:48 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000000)={r0, 0xffffffffffffffff, 0x3}) 13:02:48 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc0189436, &(0x7f00000000c0)) [ 269.213042][T23529] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 13:02:48 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1622a2c422e53c6f, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000080)=0x59903eb357798b71, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$unix(r1, &(0x7f00000000c0)=""/89, 0x59, 0x2000, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e23}, 0x6e) 13:02:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[]}) [ 269.373170][T23533] FAULT_INJECTION: forcing a failure. [ 269.373170][T23533] name failslab, interval 1, probability 0, space 0, times 0 [ 269.427032][T23533] CPU: 1 PID: 23533 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 269.436185][T23533] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.446243][T23533] Call Trace: [ 269.449638][T23533] dump_stack+0x172/0x1f0 [ 269.449661][T23533] should_fail.cold+0xa/0x15 [ 269.449676][T23533] ? fault_create_debugfs_attr+0x180/0x180 [ 269.449704][T23533] ? page_to_nid.part.0+0x20/0x20 [ 269.449720][T23533] ? ___might_sleep+0x163/0x280 [ 269.449739][T23533] __should_failslab+0x121/0x190 [ 269.449754][T23533] should_failslab+0x9/0x14 [ 269.449766][T23533] kmem_cache_alloc_trace+0x2d3/0x790 [ 269.449798][T23533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.495634][T23533] ? _copy_from_user+0x12c/0x1a0 [ 269.500597][T23533] copy_mount_options+0x5c/0x3f0 [ 269.505545][T23533] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.511803][T23533] ksys_mount+0xa7/0x150 [ 269.516148][T23533] __x64_sys_mount+0xbe/0x150 [ 269.520839][T23533] do_syscall_64+0xfa/0x760 [ 269.525355][T23533] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.531271][T23533] RIP: 0033:0x459829 [ 269.535326][T23533] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.555067][T23533] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 269.563490][T23533] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 269.572333][T23533] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 269.580311][T23533] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 269.588380][T23533] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 269.596362][T23533] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:48 executing program 3 (fault-call:13 fault-nth:3): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:48 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0xc020660b, &(0x7f00000000c0)) 13:02:48 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x3}) 13:02:48 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) fgetxattr(r0, &(0x7f0000000040)=@known='trusted.overlay.redirect\x00', &(0x7f0000000080)=""/64, 0x40) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:48 executing program 1: openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 13:02:48 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[]}) 13:02:48 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000001c0)={'eql\x00', {0x2, 0x4e21, @rand_addr=0xd1}}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000200), 0x230) getgroups(0x9, &(0x7f0000000040)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee01, 0x0, 0xffffffffffffffff, 0xee01, 0xee00]) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() setgroups(0x4, &(0x7f0000000180)=[r1, r2, r3, r4]) 13:02:48 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x2}) 13:02:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x300, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = creat(&(0x7f00000018c0)='./file0\x00', 0x84) getsockopt$bt_sco_SCO_OPTIONS(r3, 0x11, 0x1, &(0x7f0000001900)=""/69, &(0x7f0000001980)=0x45) r4 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xffffffffffffffff, 0x2) recvfrom$rose(r4, &(0x7f0000000180)=""/239, 0xef, 0x2, &(0x7f0000000280)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x5, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f00000019c0)='TIPC\x00') ioctl$EVIOCSABS3F(r4, 0x401845ff, &(0x7f0000001780)={0xadaa, 0x1, 0x200, 0xfffffffffffffff9, 0x4, 0xffffffffffff0001}) r5 = syz_open_dev$cec(&(0x7f00000002c0)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_dccp_buf(r4, 0x21, 0xe, &(0x7f00000017c0)=""/134, &(0x7f0000001880)=0x86) io_uring_register$IORING_REGISTER_BUFFERS(r5, 0x0, &(0x7f0000001700)=[{&(0x7f0000000300)=""/230, 0xe6}, {&(0x7f0000000400)=""/39, 0x27}, {&(0x7f0000000440)=""/250, 0xfa}, {&(0x7f0000000540)=""/200, 0xc8}, {&(0x7f0000000640)=""/172, 0xac}, {&(0x7f0000000700)=""/4096, 0x1000}], 0x6) [ 269.835441][T23673] FAULT_INJECTION: forcing a failure. [ 269.835441][T23673] name failslab, interval 1, probability 0, space 0, times 0 [ 269.876007][T23673] CPU: 0 PID: 23673 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 269.885149][T23673] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.895235][T23673] Call Trace: [ 269.898533][T23673] dump_stack+0x172/0x1f0 [ 269.902877][T23673] should_fail.cold+0xa/0x15 [ 269.907476][T23673] ? do_syscall_64+0xfa/0x760 [ 269.912165][T23673] ? fault_create_debugfs_attr+0x180/0x180 [ 269.917993][T23673] ? page_to_nid.part.0+0x20/0x20 [ 269.923029][T23673] ? ___might_sleep+0x163/0x280 [ 269.927888][T23673] __should_failslab+0x121/0x190 [ 269.932831][T23673] should_failslab+0x9/0x14 [ 269.937329][T23673] kmem_cache_alloc+0x2aa/0x710 [ 269.942190][T23673] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 269.947908][T23673] ? __kasan_check_read+0x11/0x20 [ 269.952959][T23673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.959205][T23673] getname_flags+0xd6/0x5b0 [ 269.963714][T23673] user_path_at_empty+0x2f/0x50 [ 269.968741][T23673] do_mount+0x150/0x1c30 [ 269.972988][T23673] ? kasan_kmalloc+0x9/0x10 [ 269.977489][T23673] ? copy_mount_string+0x40/0x40 [ 269.982426][T23673] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.988675][T23673] ? _copy_from_user+0x12c/0x1a0 [ 269.993621][T23673] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.999873][T23673] ? copy_mount_options+0x2e8/0x3f0 [ 270.005342][T23673] ksys_mount+0xdb/0x150 [ 270.009595][T23673] __x64_sys_mount+0xbe/0x150 [ 270.014371][T23673] do_syscall_64+0xfa/0x760 [ 270.018883][T23673] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.024776][T23673] RIP: 0033:0x459829 [ 270.028705][T23673] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.048309][T23673] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 270.056742][T23673] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 270.064741][T23673] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a 13:02:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[]}) 13:02:49 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x3}) [ 270.072717][T23673] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 270.080686][T23673] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 270.088655][T23673] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:49 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080), 0x8) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1f, 0x400000) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000100)=ANY=[@ANYBLOB='*\f\x00\x00\x00\x00\x00\x00']) bind$inet(r1, &(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1c}}, 0x10) timerfd_gettime(r1, &(0x7f0000000040)) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f00000000c0)={0x51000000000}) sync_file_range(r0, 0x80000001, 0x8, 0x2) 13:02:49 executing program 3 (fault-call:13 fault-nth:4): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:49 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x3}) 13:02:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[]}) 13:02:49 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, r0, 0x3}) 13:02:49 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x4}) 13:02:49 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x80000) r2 = dup(r1) ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f0000000040)={0x40000000, 0x7, "9a5334b4e1f514c94503583fbeca0c2a063425fa50e3b08d02ad31dc82e81706", 0x9d2e, 0xfff, 0x2, 0x0, 0x7ff, 0x5, 0x675f, 0xffffffffffff0001, [0xffffffffffff1d1f, 0x9, 0x42, 0x81]}) 13:02:49 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x1ca, 0x40000) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r1, 0x800442d4, &(0x7f0000000080)=0xffffffff) 13:02:49 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0xfffffffffffffd99) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x14000, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x25, &(0x7f0000000040)={@broadcast, @rand_addr=0x6, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) 13:02:49 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x5}) 13:02:49 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000240)={{0x1, 0x3, 0x0, 0x0, 0x8a1}}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x101000, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f00000001c0)={0x8f3, 0x8001, 0x3, 0x4, 0x4, 0x81}) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000140)={{0x1, 0xffff, 0x8, 0x9}, 'syz1\x00', 0x1}) r2 = fcntl$dupfd(0xffffffffffffffff, 0x407, 0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f00000000c0)) ioctl$TUNATTACHFILTER(r2, 0x401054d5, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x580e, 0x4, 0x4, 0x100000000}, {0x3, 0x6, 0x7, 0x4}, {0x5, 0x2000000, 0x0, 0xf8d}, {0x33a35a98, 0x7fffffff, 0x3ff, 0x100000000}, {0x29bf, 0x3f8000, 0x200, 0x2}]}) r3 = socket$vsock_stream(0x28, 0x1, 0x0) r4 = dup(r3) ioctl$TUNSETNOCSUM(r4, 0x400454c8, 0x1) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r3, 0x28, 0x1, &(0x7f0000000000), 0x8) [ 270.508600][T23912] FAULT_INJECTION: forcing a failure. [ 270.508600][T23912] name failslab, interval 1, probability 0, space 0, times 0 [ 270.567150][T23912] CPU: 0 PID: 23912 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 270.576289][T23912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 270.586351][T23912] Call Trace: [ 270.589655][T23912] dump_stack+0x172/0x1f0 [ 270.593993][T23912] should_fail.cold+0xa/0x15 [ 270.598586][T23912] ? do_syscall_64+0xfa/0x760 [ 270.603270][T23912] ? fault_create_debugfs_attr+0x180/0x180 [ 270.609084][T23912] ? page_to_nid.part.0+0x20/0x20 [ 270.614108][T23912] ? ___might_sleep+0x163/0x280 [ 270.619084][T23912] __should_failslab+0x121/0x190 [ 270.624032][T23912] should_failslab+0x9/0x14 [ 270.628536][T23912] kmem_cache_alloc+0x2aa/0x710 [ 270.633389][T23912] ? __kasan_check_write+0x14/0x20 [ 270.638510][T23912] getname_flags+0xd6/0x5b0 [ 270.643037][T23912] user_path_at_empty+0x2f/0x50 [ 270.647902][T23912] do_mount+0x150/0x1c30 [ 270.652175][T23912] ? kasan_kmalloc+0x9/0x10 [ 270.656683][T23912] ? copy_mount_string+0x40/0x40 [ 270.661635][T23912] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 270.667882][T23912] ? copy_mount_options+0x2e8/0x3f0 [ 270.674108][T23912] ksys_mount+0xdb/0x150 [ 270.678362][T23912] __x64_sys_mount+0xbe/0x150 [ 270.683055][T23912] do_syscall_64+0xfa/0x760 [ 270.687579][T23912] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 270.693471][T23912] RIP: 0033:0x459829 [ 270.697372][T23912] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:02:49 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[]}) 13:02:49 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) [ 270.717701][T23912] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 270.726125][T23912] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 270.734278][T23912] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 270.742343][T23912] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 270.750421][T23912] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 270.758399][T23912] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:50 executing program 3 (fault-call:13 fault-nth:5): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:50 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x6}) 13:02:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000040)=ANY=[]}) 13:02:50 executing program 1: r0 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, r0, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e20, @broadcast}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x100000000}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fffffff}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x4}, 0x10) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x0) 13:02:50 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:50 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000140)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x5, 0x40000) getuid() connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e21, 0x0, @ipv4={[], [], @remote}, 0xfff}, 0x1c) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000080)=@assoc_value={0x0, 0x80000000}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000100)={r2, 0x9, 0x893, 0x4}, 0x10) 13:02:50 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x7}) 13:02:50 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x402000, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r1, 0xc4c85512, &(0x7f00000000c0)={{0x3, 0x0, 0x80000000, 0x0, 'syz0\x00', 0x3}, 0x1, [0x0, 0x19, 0x3f, 0x20, 0x5, 0x10001, 0x7, 0x1, 0x9c4, 0xfff, 0x7fff, 0x7f, 0x5, 0x7, 0x9973, 0xfffffffffffff800, 0x3, 0x8960, 0x0, 0x3, 0x1ff, 0x9, 0x5, 0x1, 0xfff000000, 0x6, 0x256, 0x4, 0x7, 0x5, 0x1, 0x40, 0xfffffffeffffffff, 0x282e, 0x2, 0x629, 0x401, 0xa, 0x1ff, 0x89c, 0x4b8, 0x6, 0x8, 0xffffffffffffffe0, 0x80000000, 0x6, 0x100000000, 0x9bba, 0x8000, 0x7f, 0x241, 0x1000, 0x7ad, 0x80000001, 0x8, 0x1ff, 0x0, 0x7, 0x101, 0x86d, 0x3, 0x7, 0x64d5, 0x8000, 0x5f, 0xa5, 0x4, 0x6, 0x10000000000000, 0x2, 0x8, 0x2, 0x6, 0x4, 0xc587, 0xb1, 0x100000001, 0x101, 0x100, 0xeb, 0x0, 0x2, 0x8000, 0x3, 0x7fffffff, 0xffffffff, 0x6f, 0x1000, 0xfffffffffffffff9, 0x0, 0x1, 0x1, 0x4, 0x5, 0x8, 0x7, 0x80000001, 0x80, 0x0, 0x0, 0x7fff, 0x1f, 0x1, 0x1cb1, 0x10001, 0x6, 0x5, 0x4, 0x3, 0x0, 0x1, 0x3ff, 0x5, 0x1, 0xc36e, 0x2, 0x2, 0xd43, 0x5, 0x4, 0x200, 0x4, 0x3921, 0x2, 0x200, 0xec8, 0x2, 0xffff], {r2, r3+10000000}}) r4 = add_key$keyring(&(0x7f00000005c0)='keyring\x00', &(0x7f0000000600)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$update(0x2, r4, &(0x7f0000000640)="cbd2f1", 0x3) 13:02:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[]}) 13:02:50 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:50 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) getsockopt(r0, 0x4, 0x4, &(0x7f00000001c0)=""/221, &(0x7f00000002c0)=0xdd) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000580)='/dev/full\x00', 0x400000, 0x0) write$P9_RREADDIR(r1, &(0x7f0000000400)={0x141, 0x29, 0x2, {0xfff, [{{0x1, 0x4, 0x8}, 0x3f, 0x6, 0x7, './file0'}, {{0x4, 0x0, 0x2}, 0x69, 0x7, 0x7, './file0'}, {{0x8b, 0x0, 0x8}, 0x4, 0xbde9, 0x7, './file0'}, {{0x38b3b53f09eb88de, 0x0, 0x4}, 0x5, 0x0, 0x7, './file0'}, {{0x80, 0x2}, 0x68ea, 0x2, 0x7, './file0'}, {{0x4, 0x2, 0x7}, 0x8, 0x7, 0x7, './file0'}, {{0x21, 0x2, 0x5}, 0xfffffffffffffffa, 0x800, 0x7, './file0'}, {{0xa0, 0x3, 0x6}, 0x5, 0xa3, 0x7, './file0'}, {{0x0, 0x2, 0x2}, 0x1ff, 0xfbde, 0x7, './file0'}, {{0x42, 0x0, 0x3}, 0xa2, 0x80000000, 0x7, './file0'}]}}, 0x141) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9, 0x682) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe0) ioctl$VIDIOC_QUERYCAP(r2, 0x80685600, &(0x7f0000000300)) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000180)={r3, 0x1, 0x6}, 0x10) r4 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r2, 0x6, 0x3, &(0x7f0000000380)=0x20, 0x4) socket$l2tp(0x18, 0x1, 0x1) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, 0x0, 0x0) 13:02:50 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x8}) [ 271.480058][T24199] FAULT_INJECTION: forcing a failure. [ 271.480058][T24199] name failslab, interval 1, probability 0, space 0, times 0 [ 271.497536][T24199] CPU: 0 PID: 24199 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 271.506662][T24199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 271.516728][T24199] Call Trace: [ 271.520033][T24199] dump_stack+0x172/0x1f0 [ 271.520053][T24199] should_fail.cold+0xa/0x15 [ 271.520069][T24199] ? fault_create_debugfs_attr+0x180/0x180 [ 271.520089][T24199] ? ___might_sleep+0x163/0x280 [ 271.520115][T24199] __should_failslab+0x121/0x190 [ 271.544600][T24199] should_failslab+0x9/0x14 [ 271.549113][T24199] __kmalloc+0x2e0/0x770 [ 271.553367][T24199] ? save_stack+0x5c/0x90 [ 271.557708][T24199] ? save_stack+0x23/0x90 [ 271.562044][T24199] ? tomoyo_encode2.part.0+0xf5/0x400 [ 271.568912][T24199] tomoyo_encode2.part.0+0xf5/0x400 [ 271.574252][T24199] ? do_syscall_64+0xfa/0x760 [ 271.578944][T24199] tomoyo_encode+0x2b/0x50 [ 271.583371][T24199] tomoyo_mount_acl+0xe0/0x840 [ 271.588212][T24199] ? __kasan_check_read+0x11/0x20 [ 271.593318][T24199] ? __kasan_check_write+0x14/0x20 [ 271.598418][T24199] ? retint_kernel+0x2b/0x2b [ 271.603001][T24199] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 271.608682][T24199] ? retint_kernel+0x2b/0x2b [ 271.613264][T24199] ? trace_hardirqs_on_caller+0x6a/0x240 [ 271.618992][T24199] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 271.624449][T24199] ? lock_acquire+0x20b/0x410 [ 271.629142][T24199] tomoyo_mount_permission+0x16a/0x410 [ 271.634708][T24199] ? tomoyo_mount_permission+0x10a/0x410 [ 271.640328][T24199] ? tomoyo_mount_acl+0x840/0x840 [ 271.645363][T24199] ? __sanitizer_cov_trace_pc+0x4b/0x50 [ 271.650904][T24199] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 271.657155][T24199] ? strncpy_from_user+0x2b4/0x400 [ 271.662259][T24199] tomoyo_sb_mount+0x35/0x40 [ 271.666868][T24199] security_sb_mount+0x87/0xd0 [ 271.671632][T24199] do_mount+0x1d4/0x1c30 [ 271.675860][T24199] ? retint_kernel+0x2b/0x2b [ 271.680443][T24199] ? copy_mount_string+0x40/0x40 [ 271.685378][T24199] ? copy_mount_options+0x270/0x3f0 [ 271.690657][T24199] ? copy_mount_options+0x200/0x3f0 [ 271.695841][T24199] ? __sanitizer_cov_trace_pc+0x20/0x50 [ 271.701379][T24199] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 271.707638][T24199] ? copy_mount_options+0x2e8/0x3f0 [ 271.712945][T24199] ksys_mount+0xdb/0x150 [ 271.717182][T24199] __x64_sys_mount+0xbe/0x150 [ 271.721845][T24199] ? do_syscall_64+0xea/0x760 [ 271.726607][T24199] do_syscall_64+0xfa/0x760 [ 271.731149][T24199] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 271.737161][T24199] RIP: 0033:0x459829 [ 271.741097][T24199] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 271.761821][T24199] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 271.770537][T24199] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 13:02:50 executing program 3 (fault-call:13 fault-nth:6): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:50 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400000, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000080)={{0x67, @loopback, 0x4e21, 0x1, 'none\x00', 0xdeff3b070de1328a, 0x6, 0x31}, {@local, 0x4e24, 0x1, 0x681, 0x3, 0x5ac8b11e}}, 0x44) openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x200, 0x0) 13:02:50 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[]}) 13:02:50 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x300}) 13:02:50 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x2, 0x200000) statfs(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/126) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x286801, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000080)=r2) 13:02:50 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) [ 271.779579][T24199] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 271.787544][T24199] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 271.795505][T24199] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 271.803519][T24199] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:51 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:51 executing program 4: r0 = accept4$rose(0xffffffffffffffff, &(0x7f0000000040)=@full={0xb, @dev, @default, 0x0, [@rose, @null, @netrom, @null, @bcast, @default]}, &(0x7f0000000080)=0x40, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f00000000c0)) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x1, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_HYPERV_EVENTFD(r2, 0x4018aebd, &(0x7f0000000180)={0x0, r3}) syz_mount_image$bfs(&(0x7f00000001c0)='bfs\x00', &(0x7f0000000200)='./file0\x00', 0xffffffffffffffc1, 0x7, &(0x7f0000000680)=[{&(0x7f0000000240)="b42e24732769c3cfd5f9ed112b52cd4ff739ea5702a26bbe8f9f89632d174de8d51a11fd0ce9252f8f321cdca4db8c6a93cf88ab3b33763a88ef7a7a692af8c972bea94f67046dceaab64a812e69856f6d3e49dd78f692940c39cf03ff34e1daadfa827fd8d65b74ed3ef775778d04ccd42183bde05373bbbeb0323347d4230e42e729ecb79f2183", 0x88, 0x3f}, {&(0x7f0000000300)="887009914032e8e48f69ab492c83ae77aee7567ab558fedcb33e84ef49a2aafa122fc38b9121d0c150399ac2e113c22a2498da40f1f85f483694dec1a9d0253fffe9271bb63661ed17280eb5eb2f3db707201feddfed6213f344d873c6fd00e74d13ed9dfa5403", 0x67, 0x2}, {&(0x7f0000000380)="20fd58b5b0f1819ddfcf05ce4069e7271adccd5ffacadcad250c8e48fba28a98ae49a876a7233e9ddf4c78f649bbc728e7d07ca2f88eed997b0856be5052bb38bf408a1ec0e462369c403b478d7b07ae520f658df0a01517ce0ad65245f4b240f88efecf29ba52fa5e66fec473371dfb1e43ea9ca4798f269be3fe3c1a666b6e2e4522f7ebd8039d81e9f1039ebf5c55fa4f49655a7c2364256f75", 0x9b, 0x5}, {&(0x7f0000000440)="21ca016ec19af304ce857c8eb27b1299f69fefb8894159ecdf96280fcd2db722577f7a85821a6b665e18e0d17f28d8dad201e29c188c7ec346858e951d2f3da6c4021b3a615fb65abfcb1fb4925fc22a89e437b5f13035767ded465fc4fa60f50be280bdb79d6fa473ba774aec8ac0f5c7822d24e5585e4b18e9f0df83ade8b19d1871f02be54ef0297aacb71d2a169a51b5d1d323dc62925071ac4eef63bdce74c4039e366ca66f78662f900354be467bf987277a77256ceaa7243f0590628134d9b45964e4ecc7f8e87d98c20237327856d2cc251189fdf062f18b8506d13854e8a98e9fbfb6ceffdbe0f5f3d601fecd", 0xf1, 0xfff}, {&(0x7f0000000540)="6cc9b825c7b8f899cd5feaf20fdcb9f68faca2cfb7043afe43f80155a62cd4d184b06f8c280c1c7678c613fe2e98e3540eb6139a02d8a61560cdf83dd81c999160b5f48d6ac003beb982bd9bac22d6a9068aca1696c617cd935c6d494345c36a154c3740d77111e05fec0ef0", 0x6c, 0x2}, {&(0x7f00000005c0)='n', 0x1, 0x10001}, {&(0x7f0000000600)="bfde0e7c585dafb4e48da1c31f1c44a195dff7ab99b0a8ede79ac43428268dd36518383098e75be11ebb71a3b1c185f056d729e4724cf04b0ae16161fdf239a4b05db933c12b245216fc2bea08c45a472a3a2a100b66206c30e12ea49107", 0x5e, 0x8}], 0x80, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000), 0x8) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000740)={0x3, 0x0, [{}, {}, {}]}) 13:02:51 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x500}) 13:02:51 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[]}) 13:02:51 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x101000) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {}, {}]}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) [ 272.050518][T24404] FAULT_INJECTION: forcing a failure. [ 272.050518][T24404] name failslab, interval 1, probability 0, space 0, times 0 [ 272.073814][T24404] CPU: 0 PID: 24404 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 272.082972][T24404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.082978][T24404] Call Trace: [ 272.083004][T24404] dump_stack+0x172/0x1f0 [ 272.083027][T24404] should_fail.cold+0xa/0x15 [ 272.083052][T24404] ? fault_create_debugfs_attr+0x180/0x180 [ 272.111110][T24404] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 272.116583][T24404] ? ___might_sleep+0x163/0x280 [ 272.121442][T24404] __should_failslab+0x121/0x190 [ 272.126383][T24404] should_failslab+0x9/0x14 [ 272.130915][T24404] __kmalloc+0x2e0/0x770 [ 272.130931][T24404] ? tomoyo_encode2.part.0+0xba/0x400 [ 272.130943][T24404] ? tomoyo_encode2.part.0+0xf5/0x400 [ 272.130956][T24404] tomoyo_encode2.part.0+0xf5/0x400 [ 272.130972][T24404] ? do_syscall_64+0xfa/0x760 [ 272.130991][T24404] tomoyo_encode+0x2b/0x50 [ 272.147189][T24411] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=c96c0000) [ 272.151235][T24404] tomoyo_mount_acl+0xe0/0x840 [ 272.151251][T24404] ? __kasan_check_read+0x11/0x20 [ 272.151271][T24404] ? __kasan_check_write+0x14/0x20 [ 272.160364][T24404] ? retint_kernel+0x2b/0x2b [ 272.160386][T24404] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 272.173462][T24404] ? trace_hardirqs_on_thunk+0x1a/0x20 13:02:51 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) [ 272.173482][T24404] ? __this_cpu_preempt_check+0x3a/0x210 [ 272.173499][T24404] ? retint_kernel+0x2b/0x2b [ 272.173526][T24404] ? lock_acquire+0x190/0x410 [ 272.183646][T24404] ? tomoyo_mount_permission+0x10a/0x410 [ 272.183666][T24404] tomoyo_mount_permission+0x16a/0x410 [ 272.183678][T24404] ? tomoyo_mount_permission+0x10a/0x410 [ 272.183698][T24404] ? tomoyo_mount_acl+0x840/0x840 [ 272.193821][T24404] ? __this_cpu_preempt_check+0x3a/0x210 [ 272.193846][T24404] tomoyo_sb_mount+0x35/0x40 [ 272.193864][T24404] security_sb_mount+0x87/0xd0 [ 272.193887][T24404] do_mount+0x1d4/0x1c30 [ 272.255192][T24404] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 272.260674][T24404] ? copy_mount_string+0x40/0x40 [ 272.265621][T24404] ? retint_kernel+0x2b/0x2b [ 272.270245][T24404] ksys_mount+0xdb/0x150 [ 272.270263][T24404] __x64_sys_mount+0xbe/0x150 [ 272.270281][T24404] do_syscall_64+0xfa/0x760 [ 272.270301][T24404] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.270313][T24404] RIP: 0033:0x459829 [ 272.270328][T24404] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.270336][T24404] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 272.270350][T24404] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 272.270358][T24404] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a 13:02:51 executing program 3 (fault-call:13 fault-nth:7): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:51 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x600}) 13:02:51 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:51 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[]}) 13:02:51 executing program 4: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000040)='%#{]wlan1\x00', 0xffffffffffffffff}, 0x30) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x6) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0xb3fc39d80273384c}}, 0x20) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000440)=0x3ba, 0x4) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x100, @loopback, 0x15}, r3}}, 0x30) r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$TCSBRK(r4, 0x5409, 0x7) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000), 0x8) fstat(r4, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ntfs(&(0x7f0000000240)='ntfs\x00', &(0x7f0000000280)='./file0\x00', 0x10000, 0x5, &(0x7f0000000500)=[{&(0x7f00000002c0)="87dce7923138ecc3f7a9856b03f22794e2f7fc6d431d88a96dade556ec611f189b61de176ad4031f4cec191999294fd06123a55f142b0a93b94ed10948521fcf76557b1af6bcaba832470b9e957bf49dedcb97ae73a0880c1c713b4b11deebad03ce8a4173bce031f0ecf99285a4b62b0d7a586808dd30ed04da8c6906fa439ec76480f4ceab97ae4524ced70ca630dea67c5cac07", 0x95, 0x9}, {&(0x7f0000000380)="fa534f8ec8a37de108b5f4af502540adf204b13ca190ec8a368c0009e2d2a7d64df3be25cf", 0x25, 0x3}, {&(0x7f00000003c0)="368c9442b6d3123da99c8d22e24ff16854ef57f7448ac8abe75d00c1418e932445c0923762536c4c2d0566884e3873d48aebf78c459ff2fb7758bcde9121f957de5fb3677f7d126ddfcb22abfd47842403ce1b974b62df3584efe0b16f21ac8a1762210a245a73fea1", 0x69, 0x1}, {&(0x7f0000000440), 0x0, 0x5}, {&(0x7f0000000480)="6b1503b98556bfc5ba3ca6366bce7d7b455c4abb9452265592031465c710382cb622de216ed85812d5fc677c1cad72dcdee6a77ee7faa67e0c554303f6bd70ad7a8654a5939318e9", 0x48, 0x9}], 0x100800, &(0x7f0000000600)=ANY=[@ANYBLOB='nls=koi8-u,case_sensitive=no,errors=continue,mft_zone_multiplier=0x0000000000000000,uid=', @ANYRESHEX=r5, @ANYBLOB="2c666d61736b3d30303030303030303030303033373737373737373737372c646d61736b3d30303030303030303030303030303030303030303337372c6f626a5f747970653d2f70726f632f636170692f636170693230002c66756e633d4b455845435f4b45524e454c5f434805434b2c61707072616973655f747970653d696d617369672c66736e616d653d706f7369785f61636c5f6163636573732c61707072616973652c66756e633d4b455845435f494e495452414d46535f434845434b2c736d61636b66737472616e736d7574653d2f6465762f63747266732d636f6e74726f6c002c00"]) [ 272.270366][T24404] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 272.270374][T24404] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 13:02:51 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:51 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x700}) [ 272.270382][T24404] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 [ 272.373058][T24431] BFS-fs: bfs_fill_super(): No BFS filesystem on loop4 (magic=c96c0000) 13:02:51 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[]}) 13:02:51 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x3f00}) 13:02:51 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) [ 272.674208][T24462] FAULT_INJECTION: forcing a failure. [ 272.674208][T24462] name failslab, interval 1, probability 0, space 0, times 0 [ 272.738395][T24462] CPU: 1 PID: 24462 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 272.747545][T24462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 272.747553][T24462] Call Trace: [ 272.747582][T24462] dump_stack+0x172/0x1f0 [ 272.747601][T24462] should_fail.cold+0xa/0x15 [ 272.747618][T24462] ? fault_create_debugfs_attr+0x180/0x180 [ 272.747636][T24462] ? ___might_sleep+0x163/0x280 [ 272.747655][T24462] __should_failslab+0x121/0x190 [ 272.747672][T24462] should_failslab+0x9/0x14 [ 272.747693][T24462] __kmalloc+0x2e0/0x770 [ 272.775869][T24462] ? __get_fs_type+0x23/0xd0 [ 272.775888][T24462] ? tomoyo_encode2.part.0+0x340/0x400 [ 272.775903][T24462] tomoyo_encode2.part.0+0x340/0x400 [ 272.775924][T24462] ? __get_fs_type+0x9a/0xd0 [ 272.814519][T24462] tomoyo_encode+0x2b/0x50 [ 272.818962][T24462] tomoyo_mount_acl+0x320/0x840 [ 272.818976][T24462] ? __kasan_check_read+0x11/0x20 [ 272.818990][T24462] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 272.819005][T24462] ? debug_check_no_obj_freed+0xc0/0x43f [ 272.819022][T24462] ? trace_hardirqs_off+0x62/0x240 [ 272.819049][T24462] ? lock_acquire+0x190/0x410 [ 272.819061][T24462] ? tomoyo_mount_permission+0x10a/0x410 [ 272.819077][T24462] tomoyo_mount_permission+0x16a/0x410 [ 272.819088][T24462] ? tomoyo_mount_permission+0x10a/0x410 [ 272.819098][T24462] ? tomoyo_mount_acl+0x840/0x840 [ 272.819111][T24462] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 272.819129][T24462] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 272.819141][T24462] ? strncpy_from_user+0x2b4/0x400 [ 272.819162][T24462] tomoyo_sb_mount+0x35/0x40 [ 272.871709][T24462] security_sb_mount+0x87/0xd0 [ 272.871729][T24462] do_mount+0x1d4/0x1c30 [ 272.871745][T24462] ? kasan_kmalloc+0x9/0x10 [ 272.871768][T24462] ? copy_mount_string+0x40/0x40 [ 272.912575][T24462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 272.912592][T24462] ? copy_mount_options+0x2e8/0x3f0 [ 272.912613][T24462] ksys_mount+0xdb/0x150 [ 272.928301][T24462] __x64_sys_mount+0xbe/0x150 [ 272.933004][T24462] do_syscall_64+0xfa/0x760 [ 272.937527][T24462] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 272.943423][T24462] RIP: 0033:0x459829 [ 272.947326][T24462] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 272.966988][T24462] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 272.975415][T24462] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 13:02:52 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = accept(r0, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0x0, @remote}}, &(0x7f00000000c0)=0x80) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r1, 0x800443d2, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{}, {}]}) signalfd4(r0, &(0x7f0000000000)={0x6}, 0x8, 0x800) 13:02:52 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x4000}) [ 272.983398][T24462] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 272.991384][T24462] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 272.999372][T24462] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 273.007788][T24462] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:52 executing program 3 (fault-call:13 fault-nth:8): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[]}) 13:02:52 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040)=0x100000000000000, 0x8) dup3(r0, r0, 0x80000) 13:02:52 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:52 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0xff00}) 13:02:52 executing program 4: r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x8240) r1 = socket$inet(0x2, 0x0, 0x0) poll(&(0x7f00000003c0)=[{r0, 0x20}, {r1, 0x80}], 0x2, 0xe76) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x800, 0x2000) ioctl$FS_IOC_GETFLAGS(r1, 0x80086601, &(0x7f0000000400)) getsockopt$inet_opts(r3, 0x0, 0xd, &(0x7f0000000300)=""/77, &(0x7f0000000380)=0x4d) r4 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0x9, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r4, 0x11b, 0x6, &(0x7f0000000100)=0x20, 0x4) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r4, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e22, @local}}, 0x3, 0xee62}, &(0x7f0000000200)=0x90) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r4, 0x84, 0x1, &(0x7f0000000240)={r5, 0x3, 0x4, 0x7ff0000, 0x9, 0x3}, &(0x7f0000000280)=0x14) r6 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x200002) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r6, 0x84, 0x8, &(0x7f0000000080)=0x7f80fd7f, 0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:52 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:52 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x90a00, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) [ 273.301820][T24693] FAULT_INJECTION: forcing a failure. [ 273.301820][T24693] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 273.315067][T24693] CPU: 0 PID: 24693 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 273.324180][T24693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 273.324187][T24693] Call Trace: [ 273.324215][T24693] dump_stack+0x172/0x1f0 [ 273.324238][T24693] should_fail.cold+0xa/0x15 [ 273.324251][T24693] ? __kmalloc+0x163/0x770 [ 273.324269][T24693] ? fault_create_debugfs_attr+0x180/0x180 [ 273.324300][T24693] ? do_mount+0x1d4/0x1c30 [ 273.361141][T24693] ? ksys_mount+0xdb/0x150 [ 273.365580][T24693] ? __x64_sys_mount+0xbe/0x150 [ 273.370443][T24693] ? do_syscall_64+0xfa/0x760 [ 273.375143][T24693] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.381229][T24693] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 273.386961][T24693] ? bpf_prog_kallsyms_find+0x50/0x2c0 [ 273.386981][T24693] should_fail_alloc_page+0x50/0x60 13:02:52 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) [ 273.386993][T24693] __alloc_pages_nodemask+0x1a1/0x900 [ 273.387008][T24693] ? kernel_text_address+0x73/0xf0 [ 273.387023][T24693] ? __alloc_pages_slowpath+0x2530/0x2530 [ 273.387046][T24693] ? unwind_get_return_address+0x61/0xa0 [ 273.408161][T24693] ? profile_setup.cold+0xbb/0xbb [ 273.408183][T24693] ? should_fail+0x1de/0x852 [ 273.408196][T24693] ? fault_create_debugfs_attr+0x180/0x180 [ 273.408211][T24693] ? retint_kernel+0x2b/0x2b [ 273.408226][T24693] cache_grow_begin+0x90/0xd20 [ 273.408249][T24693] ? tomoyo_realpath_from_path+0xcd/0x7b0 13:02:52 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000080)={0x0, 0x69, 0x8, 0x1, 0x9b8c, 0x400, 0x100000000, 0x2, 0x0}, &(0x7f00000000c0)=0x20) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYBLOB="53a30000008fea7ca20347ec3c400b6e90f36ffbc4c01eb3114e903be3c0519c3baf60bfb2ec7c0700f77fbf8c528bb68b8b6a7d06f082b3ea1ac34b99cdd97e4e739302da91afa6578f060ef5e90ea244af1b39b023c2e394c23f51f687dc4bb6ee0000"], &(0x7f0000000180)=0x5b) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) fcntl$setstatus(r1, 0x4, 0x134a84c0b53e7331) [ 273.444308][T24693] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 273.456353][T24693] __kmalloc+0x6b2/0x770 [ 273.460602][T24693] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 273.466417][T24693] tomoyo_realpath_from_path+0xcd/0x7b0 [ 273.471973][T24693] tomoyo_mount_acl+0x149/0x840 [ 273.476832][T24693] ? __kasan_check_read+0x11/0x20 [ 273.482595][T24693] ? __kasan_check_write+0x14/0x20 [ 273.487743][T24693] ? retint_kernel+0x2b/0x2b [ 273.492351][T24693] ? tomoyo_check_mount_acl+0x1b0/0x1b0 13:02:52 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) [ 273.497912][T24693] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 273.503495][T24693] ? __this_cpu_preempt_check+0x3a/0x210 [ 273.509330][T24693] ? retint_kernel+0x2b/0x2b [ 273.513930][T24693] ? trace_hardirqs_on_caller+0x6a/0x240 [ 273.519625][T24693] tomoyo_mount_permission+0x16a/0x410 [ 273.525090][T24693] ? tomoyo_mount_permission+0x10a/0x410 [ 273.530737][T24693] ? tomoyo_mount_acl+0x840/0x840 [ 273.535790][T24693] ? __this_cpu_preempt_check+0x3a/0x210 [ 273.541471][T24693] tomoyo_sb_mount+0x35/0x40 [ 273.546155][T24693] security_sb_mount+0x87/0xd0 [ 273.550929][T24693] do_mount+0x1d4/0x1c30 [ 273.555182][T24693] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 273.560658][T24693] ? copy_mount_string+0x40/0x40 [ 273.567094][T24693] ? retint_kernel+0x2b/0x2b [ 273.571702][T24693] ksys_mount+0xdb/0x150 [ 273.575968][T24693] __x64_sys_mount+0xbe/0x150 [ 273.580659][T24693] ? __x64_sys_mount+0x1/0x150 [ 273.591019][T24693] do_syscall_64+0xfa/0x760 [ 273.595563][T24693] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 273.601463][T24693] RIP: 0033:0x459829 [ 273.605373][T24693] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 273.624992][T24693] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 273.633694][T24693] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 273.641675][T24693] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a 13:02:52 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[]}) [ 273.649659][T24693] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 273.657673][T24693] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 273.666203][T24693] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 [ 273.873316][T24693] overlayfs: workdir and upperdir must reside under the same mount 13:02:53 executing program 3 (fault-call:13 fault-nth:9): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:53 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f00000028c0)={0x20000000000000c8, [0x20, 0x6, 0xfff]}) r1 = syz_open_dev$adsp(&(0x7f0000002640)='/dev/adsp#\x00', 0x7, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000002680)={0xf59a, 0x6, 0x100000000, 0x0, 0x0, [], [], [], 0x5, 0x6}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000002100)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc4c85512, &(0x7f0000002140)={{0x5, 0x5, 0x4, 0x6b3, '\x00', 0xc95b}, 0x1, [0x7, 0x3bbe, 0xff, 0x948, 0x4, 0x23a3, 0x97, 0x20, 0x9, 0x1, 0x5, 0x101, 0x3be, 0xd0, 0xffffffffffffc440, 0x1, 0x7f, 0x100000001, 0x6, 0x6, 0x4447, 0x7ff, 0xfffffffffffffff9, 0x5, 0x1f0000000000, 0x7fffffff, 0x6, 0x0, 0x0, 0xe4e, 0x3, 0x6fd, 0x40, 0x4, 0x7, 0x8, 0xffffffffffffff6d, 0x0, 0x100, 0xc5c5, 0x1, 0x1, 0x7, 0x1, 0xebef, 0x9, 0x3, 0x490, 0x3, 0x0, 0x0, 0x24000000000000, 0x2, 0xa098, 0x6, 0x40, 0x2, 0x8, 0x7, 0x327e, 0x2, 0xde2, 0xffffffff, 0x2, 0x1, 0x91, 0x5, 0x3f, 0xfffffffffffeffff, 0x101, 0x8, 0x10000, 0x2573, 0x4, 0x3, 0x7, 0x2, 0x2, 0x0, 0x92, 0xfffffffffffffe01, 0x100000001, 0x5, 0x6, 0x1, 0x81, 0x6, 0x3, 0x7ff, 0x4, 0x7, 0x6, 0x3, 0x5, 0x10000, 0x101, 0x4, 0x80, 0x4, 0x8, 0x4, 0xfffffffffffffffd, 0x10000, 0x8, 0x200, 0x4000000000, 0xfffffffffffff001, 0x5422, 0x8b, 0xfff, 0x100, 0x5, 0x4, 0x5, 0x8000, 0x93cb, 0x2a, 0x1e6, 0xbc66, 0x8, 0x8, 0x0, 0x0, 0x77, 0x1df, 0xfffffffffffffffa, 0x59f, 0x7], {0x77359400}}) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x8, 0x200040) ioctl$KVM_GET_NESTED_STATE(r3, 0xc080aebe, &(0x7f0000000040)={0x0, 0x0, 0x2080}) 13:02:53 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x1000000}) 13:02:53 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[]}) 13:02:53 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x80, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@multicast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000300)=0xe8) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e20, @remote}, 0x10) connect$can_bcm(r1, &(0x7f0000000240)={0x1d, r2}, 0x10) splice(r1, &(0x7f0000000280), r0, &(0x7f00000002c0), 0x7, 0x7) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x12000, 0x0) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000080)=0xc25c, 0x4) 13:02:53 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x2000000}) 13:02:53 executing program 1: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x0, 0x8000) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f0000000040)=0x2, 0x8) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x0) 13:02:53 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(0x0, r2, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[]}) [ 274.245373][T25045] FAULT_INJECTION: forcing a failure. [ 274.245373][T25045] name failslab, interval 1, probability 0, space 0, times 0 13:02:53 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x3000000}) 13:02:53 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) fcntl$notify(r0, 0x402, 0xa) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)=0x800) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=@getaddr={0x14, 0x16, 0x300, 0x70bd27, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x800) [ 274.322648][T25045] CPU: 1 PID: 25045 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 274.331805][T25045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.341878][T25045] Call Trace: [ 274.345228][T25045] dump_stack+0x172/0x1f0 [ 274.349577][T25045] should_fail.cold+0xa/0x15 [ 274.354182][T25045] ? __kasan_check_read+0x11/0x20 [ 274.359223][T25045] ? fault_create_debugfs_attr+0x180/0x180 [ 274.365051][T25045] ? page_to_nid.part.0+0x20/0x20 [ 274.370095][T25045] ? ___might_sleep+0x163/0x280 [ 274.374972][T25045] __should_failslab+0x121/0x190 [ 274.379934][T25045] should_failslab+0x9/0x14 [ 274.384455][T25045] kmem_cache_alloc_trace+0x2d3/0x790 [ 274.389856][T25045] ? lockdep_init_map+0x1be/0x6d0 [ 274.394907][T25045] legacy_init_fs_context+0x48/0xe0 [ 274.400132][T25045] ? generic_parse_monolithic+0x200/0x200 [ 274.405880][T25045] alloc_fs_context+0x3db/0x6d0 [ 274.410756][T25045] fs_context_for_mount+0x25/0x30 [ 274.415812][T25045] do_mount+0x132d/0x1c30 [ 274.420174][T25045] ? copy_mount_string+0x40/0x40 [ 274.425132][T25045] ? copy_mount_options+0x270/0x3f0 [ 274.430438][T25045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 274.436693][T25045] ? copy_mount_options+0x2e8/0x3f0 [ 274.441920][T25045] ksys_mount+0xdb/0x150 [ 274.446186][T25045] __x64_sys_mount+0xbe/0x150 [ 274.446203][T25045] ? do_syscall_64+0x26/0x760 [ 274.446218][T25045] ? do_syscall_64+0x5b/0x760 [ 274.446239][T25045] do_syscall_64+0xfa/0x760 [ 274.455606][T25045] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 274.455618][T25045] RIP: 0033:0x459829 [ 274.455635][T25045] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 274.455642][T25045] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 274.470712][T25045] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 274.470720][T25045] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a 13:02:53 executing program 3 (fault-call:13 fault-nth:10): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:53 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:53 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x880, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r1, 0x111, 0x3, 0x1, 0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x100, 0x0) 13:02:53 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) 13:02:53 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x4000000}) 13:02:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[]}) [ 274.470726][T25045] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 274.470733][T25045] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 274.470740][T25045] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:53 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x5000000}) 13:02:53 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000200)={0x0, @speck128}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = creat(&(0x7f0000000180)='./file0\x00', 0x40) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000240)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x7c, r3, 0x400, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x587}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfff}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) r4 = dup(r0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendfile(r0, r0, &(0x7f0000000140), 0x3) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0xd3cfa46a8c59f0de, 0x70bd2d, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x5}, 0x4000000) 13:02:53 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:53 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:53 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[]}) 13:02:53 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x6000000}) [ 274.761173][T25198] FAULT_INJECTION: forcing a failure. [ 274.761173][T25198] name failslab, interval 1, probability 0, space 0, times 0 [ 274.858262][T25198] CPU: 1 PID: 25198 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 274.867624][T25198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 274.877696][T25198] Call Trace: [ 274.881022][T25198] dump_stack+0x172/0x1f0 [ 274.885381][T25198] should_fail.cold+0xa/0x15 [ 274.889995][T25198] ? fault_create_debugfs_attr+0x180/0x180 [ 274.895921][T25198] ? ___might_sleep+0x163/0x280 [ 274.900799][T25198] __should_failslab+0x121/0x190 [ 274.905754][T25198] should_failslab+0x9/0x14 [ 274.910284][T25198] __kmalloc+0x2e0/0x770 [ 274.914621][T25198] ? __get_fs_type+0x23/0xd0 [ 274.919334][T25198] ? tomoyo_encode2.part.0+0x340/0x400 [ 274.919348][T25198] tomoyo_encode2.part.0+0x340/0x400 [ 274.919360][T25198] ? __get_fs_type+0x9a/0xd0 [ 274.919372][T25198] tomoyo_encode+0x2b/0x50 [ 274.919382][T25198] tomoyo_mount_acl+0x320/0x840 [ 274.919394][T25198] ? __kasan_check_read+0x11/0x20 [ 274.919410][T25198] ? tomoyo_check_mount_acl+0x1b0/0x1b0 [ 274.919426][T25198] ? debug_check_no_obj_freed+0xc0/0x43f [ 274.919455][T25198] ? trace_hardirqs_off+0x62/0x240 [ 274.965414][T25198] ? lock_acquire+0x190/0x410 [ 274.970122][T25198] ? tomoyo_mount_permission+0x10a/0x410 [ 274.975783][T25198] tomoyo_mount_permission+0x16a/0x410 [ 274.981266][T25198] ? tomoyo_mount_permission+0x10a/0x410 [ 274.986928][T25198] ? tomoyo_mount_acl+0x840/0x840 [ 274.991969][T25198] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 274.998232][T25198] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.004489][T25198] ? strncpy_from_user+0x2b4/0x400 [ 275.009624][T25198] tomoyo_sb_mount+0x35/0x40 [ 275.014236][T25198] security_sb_mount+0x87/0xd0 [ 275.019121][T25198] do_mount+0x1d4/0x1c30 [ 275.023497][T25198] ? copy_mount_string+0x40/0x40 [ 275.028530][T25198] ? copy_mount_options+0x270/0x3f0 [ 275.033750][T25198] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.040099][T25198] ? copy_mount_options+0x2e8/0x3f0 [ 275.045316][T25198] ksys_mount+0xdb/0x150 [ 275.049565][T25198] __x64_sys_mount+0xbe/0x150 [ 275.054262][T25198] do_syscall_64+0xfa/0x760 [ 275.058782][T25198] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.064660][T25198] RIP: 0033:0x459829 [ 275.068546][T25198] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.088186][T25198] RSP: 002b:00007fe9d0d49c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 275.096689][T25198] RAX: ffffffffffffffda RBX: 00007fe9d0d49c90 RCX: 0000000000459829 13:02:54 executing program 3 (fault-call:13 fault-nth:11): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:54 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f00000000c0), 0x1) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x400001, 0x0) ioctl$VT_ACTIVATE(r1, 0x5606, 0x81) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000080)={0x6}, 0x4) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000000)={0x2, 0x1, 0x2, 0x5, 0x9, 0x5, 0xfff}) 13:02:54 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x7000000}) 13:02:54 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[]}) 13:02:54 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0xfdc0) [ 275.104751][T25198] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 275.112711][T25198] RBP: 000000000075bfc8 R08: 0000000020000100 R09: 0000000000000000 [ 275.120692][T25198] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d4a6d4 [ 275.128671][T25198] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:54 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, 0x0, 0x7, r0, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:54 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x8000000}) [ 275.342892][T25431] FAULT_INJECTION: forcing a failure. [ 275.342892][T25431] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 275.356148][T25431] CPU: 1 PID: 25431 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 275.365302][T25431] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 275.375367][T25431] Call Trace: [ 275.378673][T25431] dump_stack+0x172/0x1f0 [ 275.383016][T25431] should_fail.cold+0xa/0x15 [ 275.387607][T25431] ? fault_create_debugfs_attr+0x180/0x180 [ 275.387625][T25431] ? stack_trace_consume_entry+0x190/0x190 [ 275.387639][T25431] ? __kasan_check_read+0x11/0x20 [ 275.387658][T25431] should_fail_alloc_page+0x50/0x60 [ 275.387670][T25431] __alloc_pages_nodemask+0x1a1/0x900 [ 275.387690][T25431] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 275.399303][T25431] ? kasan_kmalloc+0x9/0x10 [ 275.399314][T25431] ? kmem_cache_alloc_trace+0x158/0x790 [ 275.399326][T25431] ? legacy_init_fs_context+0x48/0xe0 [ 275.399341][T25431] ? __alloc_pages_slowpath+0x2530/0x2530 [ 275.399355][T25431] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 275.399366][T25431] ? __kasan_check_read+0x11/0x20 [ 275.399386][T25431] ? fault_create_debugfs_attr+0x180/0x180 [ 275.399400][T25431] cache_grow_begin+0x90/0xd20 [ 275.399426][T25431] ? alloc_super+0x55/0x890 [ 275.467864][T25431] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.474124][T25431] kmem_cache_alloc_trace+0x6b3/0x790 [ 275.479527][T25431] ? __kasan_check_write+0x14/0x20 [ 275.479547][T25431] alloc_super+0x55/0x890 [ 275.479557][T25431] ? __kasan_check_read+0x11/0x20 [ 275.479570][T25431] sget+0x117/0x560 [ 275.479582][T25431] ? get_anon_bdev+0xc0/0xc0 [ 275.479597][T25431] ? ovl_show_options+0x550/0x550 [ 275.479610][T25431] mount_nodev+0x31/0x110 [ 275.479624][T25431] ovl_mount+0x2d/0x40 [ 275.479638][T25431] ? ovl_own_xattr_set+0x10/0x10 [ 275.479661][T25431] legacy_get_tree+0x113/0x220 [ 275.525602][T25431] ? ns_capable_common+0x93/0x100 [ 275.530648][T25431] vfs_get_tree+0x8f/0x380 [ 275.535079][T25431] do_mount+0x13b3/0x1c30 [ 275.539423][T25431] ? copy_mount_string+0x40/0x40 [ 275.539438][T25431] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 275.539450][T25431] ? _copy_from_user+0x12c/0x1a0 [ 275.539464][T25431] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 275.539477][T25431] ? copy_mount_options+0x2e8/0x3f0 [ 275.539492][T25431] ksys_mount+0xdb/0x150 [ 275.539508][T25431] __x64_sys_mount+0xbe/0x150 [ 275.539531][T25431] do_syscall_64+0xfa/0x760 [ 275.581243][T25431] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 275.587146][T25431] RIP: 0033:0x459829 13:02:54 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[]}) 13:02:54 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x3f000000}) 13:02:54 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080)=0xffc, 0xfffffffffffffdc9) 13:02:54 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r1 = semget(0x3, 0x2, 0x9f1f84a7f79bc7c) semctl$GETNCNT(r1, 0x4, 0xe, &(0x7f0000000040)=""/48) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0x0, 0x53fc89a5a9cfd13c, 0x2}, &(0x7f0000000100)=0x18) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000140)={r3}, &(0x7f0000000180)=0x8) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) [ 275.591048][T25431] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 275.610664][T25431] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 275.619091][T25431] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 275.627077][T25431] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 275.635092][T25431] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 13:02:54 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000040)={r0}) getsockopt$netrom_NETROM_N2(r1, 0x103, 0x3, &(0x7f0000000080)=0x200, &(0x7f00000000c0)=0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r2 = syz_open_dev$amidi(&(0x7f0000000100)='/dev/amidi#\x00', 0xfff, 0x81e58be062c2b3de) ppoll(&(0x7f0000000240)=[{r0, 0x3220}, {r2, 0x201}, {r0}, {r2, 0xf343c9ccc5286e3d}, {r1, 0x11e4}, {r2, 0x2}, {r2, 0x100}], 0x7, &(0x7f0000000300), &(0x7f00000002c0)={0x7}, 0x8) ioctl$DRM_IOCTL_SET_UNIQUE(r2, 0x40106410, &(0x7f0000000180)={0x1f, &(0x7f0000000140)="ac1e8536c3d62e8cebc8212c84d220d73906e1ab416f7922932a69025c6879"}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') ioctl$VHOST_GET_FEATURES(r2, 0x8008af00, &(0x7f00000001c0)) [ 275.643088][T25431] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 275.651071][T25431] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:54 executing program 3 (fault-call:13 fault-nth:12): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:54 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:54 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x40000000}) 13:02:54 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x8000, 0x400) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f00000002c0)=0x8000) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r2 = accept4(r0, &(0x7f0000000000)=@nfc_llcp, &(0x7f0000000080)=0x80, 0x800) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000000c0)={@multicast2, @remote, 0x0}, &(0x7f0000000100)=0xc) ioctl$TCSETAF(r1, 0x5408, &(0x7f00000001c0)={0xfffffffffffffffe, 0x2, 0x2, 0x8, 0x17, 0xe53, 0x3, 0x5, 0x3, 0xbb18}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000200)={@mcast2, r3}, 0x14) setsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000140)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xc}}, r3}, 0x14) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000240), &(0x7f0000000280)=0x4) 13:02:54 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:55 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0xff000000}) 13:02:55 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x100000000000000}) 13:02:55 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={r0, r1, 0x3}) [ 275.989781][T25574] FAULT_INJECTION: forcing a failure. [ 275.989781][T25574] name failslab, interval 1, probability 0, space 0, times 0 13:02:55 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:55 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x6c44, 0x142) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x5, [@remote, @remote, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @empty, @remote]}) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000140), 0x1) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000), 0x8) accept4$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14, 0x80800) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000180)='usereth0-\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000200), 0x629) [ 276.085152][T25574] CPU: 0 PID: 25574 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 276.094303][T25574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.104367][T25574] Call Trace: [ 276.107673][T25574] dump_stack+0x172/0x1f0 [ 276.112016][T25574] should_fail.cold+0xa/0x15 [ 276.116623][T25574] ? fault_create_debugfs_attr+0x180/0x180 [ 276.122457][T25574] ? page_to_nid.part.0+0x20/0x20 [ 276.127508][T25574] ? ___might_sleep+0x163/0x280 13:02:55 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x101000, 0x0) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0xa, &(0x7f00000000c0)=[{0x6000000, 0x9, 0x1f, 0x800}, {0x400, 0x2, 0x7cf8, 0x4}, {0x1ff, 0x0, 0x7, 0x9}, {0x2, 0x5, 0x3, 0x9}, {0xc886, 0x3ff, 0xffffffff, 0x200}, {0x3d, 0x9, 0x2, 0x3}, {0xfffffffffffff000, 0x0, 0x33, 0x9a}, {0x800, 0x0, 0x7fffffff, 0x5}, {0x7, 0x7fffffff, 0x6, 0x80000001}, {0xbf, 0x6, 0xfff, 0x2}]}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000), 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000040)=0x10001, 0x4) [ 276.132378][T25574] __should_failslab+0x121/0x190 [ 276.137334][T25574] should_failslab+0x9/0x14 [ 276.141845][T25574] __kmalloc+0x2e0/0x770 [ 276.146189][T25574] ? __list_lru_init+0xd1/0x710 [ 276.151057][T25574] __list_lru_init+0xd1/0x710 [ 276.155753][T25574] alloc_super+0x762/0x890 [ 276.160228][T25574] sget+0x117/0x560 [ 276.164044][T25574] ? get_anon_bdev+0xc0/0xc0 [ 276.168650][T25574] ? ovl_show_options+0x550/0x550 [ 276.173713][T25574] mount_nodev+0x31/0x110 [ 276.178062][T25574] ovl_mount+0x2d/0x40 [ 276.182139][T25574] ? ovl_own_xattr_set+0x10/0x10 [ 276.187083][T25574] legacy_get_tree+0x113/0x220 [ 276.187098][T25574] ? ns_capable_common+0x93/0x100 [ 276.187114][T25574] vfs_get_tree+0x8f/0x380 [ 276.187136][T25574] do_mount+0x13b3/0x1c30 [ 276.201336][T25574] ? copy_mount_string+0x40/0x40 [ 276.210594][T25574] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.216849][T25574] ? _copy_from_user+0x12c/0x1a0 [ 276.221807][T25574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.228065][T25574] ? copy_mount_options+0x2e8/0x3f0 13:02:55 executing program 4: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x80080, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000000c0)={0x0, 0x8f, "ea2165d472076ae9846504174efec24d53fd0cc2af46235488fcc1465fa0da9f397e6a9e49fe3e827e8d4cf1cc1b0c70ba561a094adfe2755d612605cc2b8e12948252ad9bde736a2d065470d388ae9bb2e1d349470490f2d0dec9bf1a8e6ddef0b9b63c5d5cc7277e108fa4a47f00c3a21f349b27d81a24937addfe364718bb963e3f701c6a74e8ed82b9048e0394"}, &(0x7f0000000180)=0x97) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={r1, 0x5}, &(0x7f0000000200)=0x8) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f0000000440)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TIOCLINUX3(r0, 0x541c, &(0x7f0000000080)) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000000), 0x8) openat$nullb(0xffffffffffffff9c, &(0x7f0000000400)='/dev/nullb0\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f00000002c0)={0x6, 0x118, 0xfa00, {{0x8, 0xba, "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", 0x61, 0xe7, 0x8001, 0x8, 0x6, 0x80, 0x1, 0x1}, r2}}, 0x120) [ 276.233372][T25574] ksys_mount+0xdb/0x150 [ 276.237645][T25574] __x64_sys_mount+0xbe/0x150 [ 276.242372][T25574] do_syscall_64+0xfa/0x760 [ 276.246922][T25574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.252819][T25574] RIP: 0033:0x459829 [ 276.256748][T25574] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.276569][T25574] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 276.285021][T25574] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 276.285040][T25574] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 276.300980][T25574] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 276.308968][T25574] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 276.308976][T25574] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:55 executing program 3 (fault-call:13 fault-nth:13): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:55 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x2000, 0x0) ioctl$RTC_PLL_SET(r1, 0x40207012, &(0x7f0000000040)={0x4, 0x8, 0x6, 0x1f, 0xd33, 0x8, 0x9}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:55 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={r0, r1, 0x3}) 13:02:55 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x200000000000000}) 13:02:55 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:55 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:55 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x6, 0x8000) getpeername$inet(r0, &(0x7f0000000080)={0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:55 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x300000000000000}) 13:02:55 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, 0x0) [ 276.668118][T25788] FAULT_INJECTION: forcing a failure. [ 276.668118][T25788] name failslab, interval 1, probability 0, space 0, times 0 [ 276.707622][T25788] CPU: 1 PID: 25788 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 276.716790][T25788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 276.727367][T25788] Call Trace: [ 276.730681][T25788] dump_stack+0x172/0x1f0 [ 276.735044][T25788] should_fail.cold+0xa/0x15 [ 276.739663][T25788] ? fault_create_debugfs_attr+0x180/0x180 [ 276.745505][T25788] ? retint_kernel+0x2b/0x2b [ 276.750123][T25788] ? ___might_sleep+0x163/0x280 [ 276.754998][T25788] __should_failslab+0x121/0x190 [ 276.759957][T25788] should_failslab+0x9/0x14 [ 276.764477][T25788] kmem_cache_alloc_node_trace+0x274/0x750 [ 276.770309][T25788] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 276.776152][T25788] __kmalloc_node+0x3d/0x70 [ 276.780680][T25788] kvmalloc_node+0x68/0x100 [ 276.785206][T25788] __list_lru_init+0x4d5/0x710 [ 276.789999][T25788] alloc_super+0x762/0x890 [ 276.794443][T25788] sget+0x117/0x560 [ 276.798284][T25788] ? get_anon_bdev+0xc0/0xc0 [ 276.802898][T25788] ? ovl_show_options+0x550/0x550 [ 276.807936][T25788] mount_nodev+0x31/0x110 [ 276.812285][T25788] ovl_mount+0x2d/0x40 [ 276.816365][T25788] ? ovl_own_xattr_set+0x10/0x10 [ 276.821320][T25788] legacy_get_tree+0x113/0x220 [ 276.826102][T25788] ? ns_capable_common+0x93/0x100 [ 276.831170][T25788] vfs_get_tree+0x8f/0x380 [ 276.835615][T25788] do_mount+0x13b3/0x1c30 [ 276.839981][T25788] ? copy_mount_string+0x40/0x40 [ 276.844980][T25788] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 276.851245][T25788] ? _copy_from_user+0x12c/0x1a0 [ 276.856211][T25788] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 276.862619][T25788] ? copy_mount_options+0x2e8/0x3f0 [ 276.868029][T25788] ksys_mount+0xdb/0x150 [ 276.872672][T25788] __x64_sys_mount+0xbe/0x150 [ 276.877369][T25788] do_syscall_64+0xfa/0x760 [ 276.881895][T25788] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 276.887796][T25788] RIP: 0033:0x459829 [ 276.891702][T25788] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 276.911317][T25788] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 276.919747][T25788] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 276.927731][T25788] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 276.935715][T25788] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 276.943702][T25788] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 276.951692][T25788] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:56 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8, 0x100) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bpq0\x00', 0x0}) sendmsg(r1, &(0x7f0000000440)={&(0x7f0000000180)=@vsock={0x28, 0x0, 0x2711, @hyper}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000200)="4c15332b0c69d6280df275263099474ee922291cd51a5cf26ed7a96eba38aee9e69141eba2901adb734b811fc7b9cac4c9a569945621feabd17f78df6fddb9a33f7721360dc9d2e287ca3071809357d427cf590a44db7053ca3b28df23024c82286cf457c58fac1fb39cacd122b0c7700f193413833894b58268f9fb7659b805bace", 0x82}, {&(0x7f00000002c0)="c7c1f1023da49f02528e6a3029e5482e506e2892bd0434decf37e0624d3a7ad9a048ffb05eb32e18304d9e150fa03e6c7e0fc66156f41cf97dbe58", 0x3b}, {&(0x7f0000000300)="6482fe6e495f42645d62d853d18ab91564f59bf4dd42e0c7a407066fd1d7ce7bfa21710001fa", 0x26}], 0x3, &(0x7f0000000380)=[{0x90, 0x109, 0x1000, "8f0557b483b6bc2a0bb2afa112b3672d8dcc2f9ae57138d6b0fb8719195760609406ef8e7700cef661607174613f2bd2090131b188cba443a7f355b327bf6c457f71203c8db1e1396dbb5a2496f1147236b7c0e884d3448ef064015683b8c5033ca81348e8e58536766d52d4959d782fb98e5b05a6d7d18b81fcec"}], 0x90}, 0x80) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', r2}) bind$unix(r1, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e23}, 0x6e) 13:02:56 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0xffffffffffffffff, 0x80000) connect$rxrpc(r1, &(0x7f0000001180)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @loopback}}, 0x24) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f00000000c0)={0x0, &(0x7f0000000180)="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"}) socketpair(0x1, 0x5, 0x5, &(0x7f0000000100)={0xffffffffffffffff}) setsockopt$CAIFSO_LINK_SELECT(r2, 0x116, 0x7f, &(0x7f0000000140)=0x4, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) 13:02:56 executing program 3 (fault-call:13 fault-nth:14): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:56 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x400000000000000}) 13:02:56 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, 0x0) 13:02:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:56 executing program 4: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x20) r1 = socket$vsock_stream(0x28, 0x1, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x4, 0xffff, 0x3}) r3 = add_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="ed1fb619c0898e3a", 0x8, 0xfffffffffffffffe) keyctl$get_persistent(0x16, r2, r3) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000240)={0x18, 0x1, 0x0, {0x5}}, 0x18) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000)=0x4, 0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x5, 0x4, [0x54, 0x9, 0x11, 0x9]}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000340)=@sack_info={r4, 0x7, 0x7}, 0xc) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RSETATTR(r5, &(0x7f0000000200)={0x7, 0x1b, 0x2}, 0x7) 13:02:56 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x500000000000000}) 13:02:56 executing program 1: setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0xfffffffffffffda3) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40, 0x0) statx(r0, &(0x7f00000000c0)='./file0\x00', 0x75dcf066b137f4c2, 0x7ff, &(0x7f0000000100)) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x20000, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) chdir(&(0x7f0000000040)='./file0\x00') [ 277.293616][T25888] FAULT_INJECTION: forcing a failure. [ 277.293616][T25888] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 277.306850][T25888] CPU: 0 PID: 25888 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 277.315966][T25888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 277.326044][T25888] Call Trace: [ 277.326071][T25888] dump_stack+0x172/0x1f0 [ 277.326089][T25888] should_fail.cold+0xa/0x15 [ 277.326105][T25888] ? fault_create_debugfs_attr+0x180/0x180 [ 277.326126][T25888] should_fail_alloc_page+0x50/0x60 [ 277.326148][T25888] __alloc_pages_nodemask+0x1a1/0x900 [ 277.354696][T25888] ? trace_hardirqs_on_caller+0x6a/0x240 [ 277.360336][T25888] ? kasan_kmalloc+0x9/0x10 [ 277.364856][T25888] ? __alloc_pages_slowpath+0x2530/0x2530 [ 277.370598][T25888] ? fault_create_debugfs_attr+0x180/0x180 [ 277.376418][T25888] cache_grow_begin+0x90/0xd20 [ 277.381192][T25888] ? alloc_super+0x55/0x890 [ 277.385715][T25888] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 13:02:56 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, 0x0) [ 277.391966][T25888] kmem_cache_alloc_trace+0x6b3/0x790 [ 277.397348][T25888] ? __kasan_check_write+0x14/0x20 [ 277.402481][T25888] alloc_super+0x55/0x890 [ 277.406907][T25888] ? __kasan_check_read+0x11/0x20 [ 277.411949][T25888] sget+0x117/0x560 [ 277.415765][T25888] ? get_anon_bdev+0xc0/0xc0 [ 277.420374][T25888] ? ovl_show_options+0x550/0x550 [ 277.425414][T25888] mount_nodev+0x31/0x110 [ 277.429756][T25888] ovl_mount+0x2d/0x40 [ 277.433843][T25888] ? ovl_own_xattr_set+0x10/0x10 [ 277.438786][T25888] legacy_get_tree+0x113/0x220 13:02:56 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80, 0x0) ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000040)={0x1, 0x80000000, 0x6}) [ 277.438801][T25888] ? ns_capable_common+0x93/0x100 [ 277.438816][T25888] vfs_get_tree+0x8f/0x380 [ 277.438831][T25888] do_mount+0x13b3/0x1c30 [ 277.438854][T25888] ? copy_mount_string+0x40/0x40 [ 277.462271][T25888] ? __sanitizer_cov_trace_const_cmp4+0xa/0x20 [ 277.468440][T25888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 277.474705][T25888] ? copy_mount_options+0x2e8/0x3f0 [ 277.479926][T25888] ksys_mount+0xdb/0x150 [ 277.484182][T25888] __x64_sys_mount+0xbe/0x150 [ 277.488872][T25888] do_syscall_64+0xfa/0x760 [ 277.493384][T25888] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 277.499291][T25888] RIP: 0033:0x459829 [ 277.503193][T25888] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 277.522815][T25888] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 277.531253][T25888] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 277.539501][T25888] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 277.547480][T25888] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 277.555463][T25888] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 277.563451][T25888] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:56 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040), 0x8) bind$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/5, &(0x7f00000000c0)=0x5) 13:02:56 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:56 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x600000000000000}) [ 277.685529][T25888] overlayfs: workdir and upperdir must reside under the same mount 13:02:57 executing program 3 (fault-call:13 fault-nth:15): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:57 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={0xffffffffffffffff, r1, 0x3}) 13:02:57 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x700000000000000}) 13:02:57 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x8000) setsockopt$rose(r0, 0x104, 0x7, &(0x7f0000000040), 0x4) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x0) 13:02:57 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080)=0x9, 0x2) r1 = dup3(r0, r0, 0x80000) ioctl$TIOCLINUX3(r1, 0x541c, &(0x7f0000000000)) 13:02:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:57 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x800000000000000}) 13:02:57 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={0xffffffffffffffff, r1, 0x3}) 13:02:57 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x20000596, 0x0) sendto$ax25(r1, &(0x7f0000000080)="1ecdb7600ed878dbfe3a16046eb7c09bf3deae0d3fb8487f89d60978e8621c653109e0e845970f843293a619d24a3742a03e59640f87174d2584e6b807", 0x3d, 0x1, &(0x7f00000000c0)={{0x3, @default, 0x3}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @default, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) mq_open(&(0x7f0000000140)='/dev/vcsa#\x00', 0x80, 0x2, &(0x7f0000000180)={0x0, 0x10000, 0x6, 0x401, 0xf800000000000, 0x400, 0x9, 0x2}) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000200)={'filter\x00', 0x7, 0x4, 0x480, 0x280, 0x280, 0x140, 0x398, 0x398, 0x398, 0x4, &(0x7f0000000040), {[{{@arp={@multicast2, @local, 0xffffff00, 0x0, @empty, {[0xff, 0xff, 0x0, 0x3b94e1baefd2f2b3]}, @empty, {[0xff, 0xff, 0x0, 0x7f52837b61f2dd7, 0x0, 0xff]}, 0x1, 0xf7, 0x7fffffff, 0x3, 0x400, 0x6, 'team0\x00', 'team_slave_1\x00', {0xff}, {0xff}, 0x0, 0xa0}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @broadcast, @loopback, 0x9}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @local, 0x8, 0x1}}}, {{@uncond, 0xf0, 0x118}, @unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00', 0x3, {0x0, 0x1000, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4d0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:57 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) vmsplice(r0, &(0x7f00000010c0)=[{&(0x7f0000001100)="6a60d328f4e2de82a3d0fc0040e212baaae6590adc00e673c52c2df41ecdb4f1dcde9ff8ad5c89602cafd88eaa00a418fe734aa12f3214270346d2b44c2c7bf444313b888a2d31ba52360561242ff19a5d3d2ec5b57806422c84c21592ee53752d29f45ced75adedb437f276833c54db00914bf6069d513c26f4b3fb7ffdf0a9cebc6f1c688c02d04c12fda490fb41a4f99f84eb9a0b30b1ef516941a8ec30206a1b1f618f1deddccbcc1a804ff74d6b6e47246bc4668348614fae5d241f86a570a2b5877e91633e9570896426a4f903bb6a81d707b4cd7ae6e156620e6248d6ba7b3355e5bad6", 0xe7}, {&(0x7f00000000c0)="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", 0x1000}], 0x2, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x402, 0x0) write$P9_RSTATFS(r1, &(0x7f0000001280)={0x43, 0x9, 0x2, {0x80, 0x20, 0x1, 0x644, 0x1, 0x10001, 0xffffffffffffffff, 0x40, 0x1}}, 0x43) r2 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x80000, 0x0) bind$vsock_stream(r2, &(0x7f0000000040)={0x28, 0x0, 0x2711, @reserved}, 0x10) ioctl$PIO_SCRNMAP(r2, 0x4b41, &(0x7f0000001200)="a0ab6d13184dedd32e5343943fe49ad85a0a4a24a5022d19ad71df7ae52128e75d42272f2f1ade0a73425785a3c8aa59e6677775ee3b84b98a47e624eb70b44cca9b5ad58bdfc0e14643b97e938de3892d4dcdb9aad54ec694d2ef733929c8843f99eea66de622cedbeb81af") 13:02:57 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x3f00000000000000}) [ 278.171616][T26256] FAULT_INJECTION: forcing a failure. [ 278.171616][T26256] name failslab, interval 1, probability 0, space 0, times 0 [ 278.289868][T26256] CPU: 1 PID: 26256 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 278.299023][T26256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.309089][T26256] Call Trace: [ 278.312398][T26256] dump_stack+0x172/0x1f0 [ 278.316753][T26256] should_fail.cold+0xa/0x15 [ 278.321369][T26256] ? fault_create_debugfs_attr+0x180/0x180 [ 278.327196][T26256] __should_failslab+0x121/0x190 [ 278.332154][T26256] should_failslab+0x9/0x14 [ 278.336669][T26256] kmem_cache_alloc_node_trace+0x274/0x750 [ 278.342488][T26256] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 278.342504][T26256] __kmalloc_node+0x3d/0x70 [ 278.342517][T26256] kvmalloc_node+0x68/0x100 [ 278.342529][T26256] __list_lru_init+0x4d5/0x710 [ 278.342546][T26256] alloc_super+0x762/0x890 [ 278.342561][T26256] sget+0x117/0x560 [ 278.342574][T26256] ? get_anon_bdev+0xc0/0xc0 [ 278.342597][T26256] ? ovl_show_options+0x550/0x550 [ 278.382649][T26256] mount_nodev+0x31/0x110 [ 278.382677][T26256] ovl_mount+0x2d/0x40 [ 278.391189][T26256] ? ovl_own_xattr_set+0x10/0x10 [ 278.399442][T26256] legacy_get_tree+0x113/0x220 [ 278.404220][T26256] ? ns_capable_common+0x93/0x100 [ 278.409274][T26256] vfs_get_tree+0x8f/0x380 [ 278.409300][T26256] do_mount+0x13b3/0x1c30 [ 278.418039][T26256] ? __this_cpu_preempt_check+0x3a/0x210 [ 278.423692][T26256] ? copy_mount_string+0x40/0x40 [ 278.428641][T26256] ? copy_mount_options+0x260/0x3f0 [ 278.428664][T26256] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.440222][T26256] ? copy_mount_options+0x2e8/0x3f0 [ 278.445442][T26256] ksys_mount+0xdb/0x150 [ 278.449703][T26256] __x64_sys_mount+0xbe/0x150 [ 278.454397][T26256] ? ksys_mount+0x150/0x150 [ 278.458967][T26256] do_syscall_64+0xfa/0x760 [ 278.463592][T26256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.469521][T26256] RIP: 0033:0x459829 [ 278.473422][T26256] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.493116][T26256] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 278.501541][T26256] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 278.509522][T26256] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 278.517647][T26256] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 278.517655][T26256] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 13:02:57 executing program 3 (fault-call:13 fault-nth:16): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:57 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) socket$pppoe(0x18, 0x1, 0x0) 13:02:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:57 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f0000000000)={0xffffffffffffffff, r1, 0x3}) 13:02:57 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x4000000000000000}) 13:02:57 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4000, 0x32) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) [ 278.517662][T26256] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:57 executing program 4: setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, &(0x7f0000000040)=0x10000, 0xfffffded) r0 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0xfff, 0x200000) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x100000001) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x40080) 13:02:57 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0xff00000000000000}) [ 278.613561][T26449] FAULT_INJECTION: forcing a failure. [ 278.613561][T26449] name failslab, interval 1, probability 0, space 0, times 0 [ 278.667951][T26449] CPU: 1 PID: 26449 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 278.678569][T26449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 278.678576][T26449] Call Trace: [ 278.678607][T26449] dump_stack+0x172/0x1f0 [ 278.678626][T26449] should_fail.cold+0xa/0x15 [ 278.678646][T26449] ? fault_create_debugfs_attr+0x180/0x180 [ 278.678666][T26449] ? page_to_nid.part.0+0x20/0x20 [ 278.678682][T26449] ? ___might_sleep+0x163/0x280 [ 278.678698][T26449] __should_failslab+0x121/0x190 [ 278.678715][T26449] should_failslab+0x9/0x14 [ 278.678728][T26449] __kmalloc+0x2e0/0x770 [ 278.678744][T26449] ? __list_lru_init+0xd1/0x710 [ 278.678758][T26449] __list_lru_init+0xd1/0x710 [ 278.678776][T26449] alloc_super+0x762/0x890 [ 278.678794][T26449] sget+0x117/0x560 [ 278.678809][T26449] ? get_anon_bdev+0xc0/0xc0 [ 278.678835][T26449] ? ovl_show_options+0x550/0x550 [ 278.753031][T26449] mount_nodev+0x31/0x110 [ 278.753054][T26449] ovl_mount+0x2d/0x40 [ 278.766462][T26449] ? ovl_own_xattr_set+0x10/0x10 [ 278.771415][T26449] legacy_get_tree+0x113/0x220 [ 278.776194][T26449] ? ns_capable_common+0x93/0x100 [ 278.781232][T26449] vfs_get_tree+0x8f/0x380 [ 278.785773][T26449] do_mount+0x13b3/0x1c30 [ 278.790143][T26449] ? copy_mount_string+0x40/0x40 [ 278.795104][T26449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 278.801361][T26449] ? copy_mount_options+0x2e8/0x3f0 [ 278.806600][T26449] ksys_mount+0xdb/0x150 [ 278.810875][T26449] __x64_sys_mount+0xbe/0x150 [ 278.815575][T26449] do_syscall_64+0xfa/0x760 [ 278.820102][T26449] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 278.826000][T26449] RIP: 0033:0x459829 [ 278.829905][T26449] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 278.849520][T26449] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 278.857942][T26449] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 13:02:57 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000000)={r0, 0xffffffffffffffff, 0x3}) 13:02:57 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:58 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x400) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) [ 278.865930][T26449] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 278.873926][T26449] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 278.881913][T26449] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 278.889985][T26449] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:58 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x2}) 13:02:58 executing program 3 (fault-call:13 fault-nth:17): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:58 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="5a934166e6246e0ac8d9ac679c8ac07fd8cacc0ac6e9d98c01faeb66d6e97b308f5b97c1c077202a3df23f6f24b85cc8010bd7daf5fd51cc59981af94db38478c721c49d8f1a1cea97375768a4e8b63a517dd1c6ec9a481a0158bc7a0aa5983e0fd7fe04a675ac27073438b6302de9624b781ee489d745bbd3580343670a300c1037e1eb8c0a287b1f95a7f99b943ebb4fc282319539c423e2ad007171a07c8bea44bff2d87f4d9059", 0xa9, 0xfffffffffffffffa) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="258bbca929ef2305ebc8377bc4c0391d5a3a0c3f7f4245fb6fba92aaa2feb257cf5ea34c2ed9e21234f674d1fd87590d9e5bf0c3bd5b94b37e2c7dd074a22b06ef57871a506e8e5bff02c655d227c7bbb48a478698e20161c09a982d40e65d2769f0f44748ff4ecdd72005ecea28b11e9faeb97cd1867b5694451cd75797bf184b80b2d267e5d7260efb373f69866644ffba2ccec6a2fbaf75d999d46414e0149530f7ffce63951b9aa9c0c3f3fc73409782535a193e47e987c62172ee4dcab2c3bab28bd7b1ab8c539d8a28ad1061e642417c16d27bd851a5079ea65a104702ad1d8194bcfffff50aeea98b40153c2ef73a8b", 0xf3, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0xac8e, r2) r3 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x2400) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') getsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f0000000480)=0x6, &(0x7f00000004c0)=0x4) sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x58, r4, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x30}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8081}, 0x4000) 13:02:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:58 executing program 1: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$sock_bt_hci(r0, 0x400448e0, &(0x7f0000000040)="5a89c8ed6e2264cebdc260a620cf4c2dd40b70a8105973f8d3140da5d5c71a19194d8913a3c2395a68e3b9e619ef3b0c6c96c81f7b81379dc0c519459dc220086d") r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x0) 13:02:58 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x3}) 13:02:58 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x4}) [ 279.366348][T26690] FAULT_INJECTION: forcing a failure. [ 279.366348][T26690] name failslab, interval 1, probability 0, space 0, times 0 [ 279.383864][T26690] CPU: 0 PID: 26690 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 279.393004][T26690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 279.403072][T26690] Call Trace: [ 279.406380][T26690] dump_stack+0x172/0x1f0 [ 279.414234][T26690] should_fail.cold+0xa/0x15 [ 279.414250][T26690] ? fault_create_debugfs_attr+0x180/0x180 [ 279.414267][T26690] ? page_to_nid.part.0+0x20/0x20 [ 279.414281][T26690] ? ___might_sleep+0x163/0x280 [ 279.414299][T26690] __should_failslab+0x121/0x190 [ 279.414322][T26690] should_failslab+0x9/0x14 [ 279.444122][T26690] kmem_cache_alloc_trace+0x2d3/0x790 [ 279.449515][T26690] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 279.455340][T26690] __memcg_init_list_lru_node+0x8a/0x1e0 [ 279.460999][T26690] __list_lru_init+0x3fe/0x710 [ 279.465790][T26690] alloc_super+0x762/0x890 [ 279.470231][T26690] sget+0x117/0x560 [ 279.474140][T26690] ? get_anon_bdev+0xc0/0xc0 [ 279.478747][T26690] ? ovl_show_options+0x550/0x550 [ 279.483794][T26690] mount_nodev+0x31/0x110 [ 279.488139][T26690] ovl_mount+0x2d/0x40 [ 279.492221][T26690] ? ovl_own_xattr_set+0x10/0x10 [ 279.497166][T26690] legacy_get_tree+0x113/0x220 [ 279.502114][T26690] ? ns_capable_common+0x93/0x100 [ 279.507151][T26690] vfs_get_tree+0x8f/0x380 [ 279.511584][T26690] do_mount+0x13b3/0x1c30 [ 279.515926][T26690] ? copy_mount_string+0x40/0x40 [ 279.520870][T26690] ? copy_mount_options+0x241/0x3f0 [ 279.526113][T26690] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 279.533171][T26690] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 279.539425][T26690] ? copy_mount_options+0x2e8/0x3f0 [ 279.544643][T26690] ksys_mount+0xdb/0x150 [ 279.548907][T26690] __x64_sys_mount+0xbe/0x150 [ 279.553600][T26690] do_syscall_64+0xfa/0x760 [ 279.558117][T26690] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 279.564012][T26690] RIP: 0033:0x459829 [ 279.569427][T26690] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 279.589066][T26690] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 279.597492][T26690] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 279.605476][T26690] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a 13:02:58 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x5}) 13:02:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 279.613464][T26690] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 279.621532][T26690] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 279.629514][T26690] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:58 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000000)={r0, 0xffffffffffffffff, 0x3}) 13:02:58 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000000)={0x7ff}, 0x10) write(r1, &(0x7f0000000200)="200000001a00010000000066835f7f081c000000000001000100000004001e00", 0x20) socket$bt_bnep(0x1f, 0x3, 0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:58 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x6}) 13:02:58 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x40800) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x9, 0x30}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000000c0)={r2, 0x9}, &(0x7f0000000100)=0x8) 13:02:58 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:58 executing program 3 (fault-call:13 fault-nth:18): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:59 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000100), 0x8) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) rt_sigpending(&(0x7f00000000c0), 0x8) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0x1da2) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) ioctl$BLKIOOPT(r1, 0x1279, &(0x7f0000000080)) 13:02:59 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x7}) [ 279.950940][T26821] FAULT_INJECTION: forcing a failure. [ 279.950940][T26821] name failslab, interval 1, probability 0, space 0, times 0 [ 280.004901][T26821] CPU: 1 PID: 26821 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 280.014140][T26821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.024206][T26821] Call Trace: [ 280.027605][T26821] dump_stack+0x172/0x1f0 [ 280.031984][T26821] should_fail.cold+0xa/0x15 [ 280.036594][T26821] ? fault_create_debugfs_attr+0x180/0x180 [ 280.042429][T26821] ? page_to_nid.part.0+0x20/0x20 [ 280.047565][T26821] ? ___might_sleep+0x163/0x280 [ 280.052440][T26821] __should_failslab+0x121/0x190 [ 280.057398][T26821] should_failslab+0x9/0x14 [ 280.061911][T26821] kmem_cache_alloc_trace+0x2d3/0x790 [ 280.067300][T26821] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 280.073123][T26821] __memcg_init_list_lru_node+0x8a/0x1e0 [ 280.078772][T26821] __list_lru_init+0x3fe/0x710 [ 280.083581][T26821] alloc_super+0x762/0x890 [ 280.088013][T26821] sget+0x117/0x560 [ 280.091835][T26821] ? get_anon_bdev+0xc0/0xc0 [ 280.096435][T26821] ? ovl_show_options+0x550/0x550 [ 280.101475][T26821] mount_nodev+0x31/0x110 [ 280.105836][T26821] ovl_mount+0x2d/0x40 [ 280.109927][T26821] ? ovl_own_xattr_set+0x10/0x10 [ 280.115145][T26821] legacy_get_tree+0x113/0x220 [ 280.119923][T26821] ? ns_capable_common+0x93/0x100 [ 280.124970][T26821] vfs_get_tree+0x8f/0x380 [ 280.129400][T26821] do_mount+0x13b3/0x1c30 [ 280.133747][T26821] ? copy_mount_string+0x40/0x40 [ 280.138825][T26821] ? __sanitizer_cov_trace_const_cmp8+0xf/0x20 [ 280.145011][T26821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 280.151271][T26821] ? copy_mount_options+0x2e8/0x3f0 [ 280.156512][T26821] ksys_mount+0xdb/0x150 [ 280.160778][T26821] __x64_sys_mount+0xbe/0x150 [ 280.165489][T26821] do_syscall_64+0xfa/0x760 [ 280.170015][T26821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 280.175940][T26821] RIP: 0033:0x459829 [ 280.180019][T26821] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:02:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:02:59 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000000)={r0}) 13:02:59 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.events\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={0x0, 0x10000}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r2, 0xfffffffffffffbff, 0x8}, 0x8) [ 280.199891][T26821] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 280.208315][T26821] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 280.216527][T26821] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 280.224515][T26821] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 280.232500][T26821] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 280.240570][T26821] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:02:59 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x8}) 13:02:59 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.opaque\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:02:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[]}) 13:02:59 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x300}) 13:02:59 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x9645f0ab0ca7b53a, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0xc90) lsetxattr$security_selinux(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:systemd_passwd_var_run_t:s0\x00', 0x2e, 0x1) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:02:59 executing program 3 (fault-call:13 fault-nth:19): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:02:59 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x500}) 13:02:59 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x5d) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000000)={'bridge_slave_0\x00', 0x5}) 13:02:59 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x600}) 13:02:59 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040), 0x8) 13:02:59 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[]}) 13:02:59 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f0000000000)={r0, 0xffffffffffffffff, 0x3}) 13:02:59 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$RDS_RECVERR(r0, 0x114, 0x5, &(0x7f0000000040), 0x4) ioctl$KVM_SMI(r0, 0xaeb7) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0xfffffffffffffe1a) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x5667fff4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000100)={r2, @in6={{0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}, 0x10001, 0x20, 0xc37, 0x3, 0x401}, &(0x7f00000001c0)=0x98) [ 280.824131][T27175] FAULT_INJECTION: forcing a failure. [ 280.824131][T27175] name failslab, interval 1, probability 0, space 0, times 0 [ 280.917606][T27175] CPU: 1 PID: 27175 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 280.926768][T27175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 280.937268][T27175] Call Trace: [ 280.940607][T27175] dump_stack+0x172/0x1f0 [ 280.945054][T27175] should_fail.cold+0xa/0x15 [ 280.949817][T27175] ? fault_create_debugfs_attr+0x180/0x180 [ 280.956154][T27175] ? page_to_nid.part.0+0x20/0x20 [ 280.961202][T27175] ? ___might_sleep+0x163/0x280 [ 280.966098][T27175] __should_failslab+0x121/0x190 [ 280.971054][T27175] should_failslab+0x9/0x14 [ 280.975569][T27175] kmem_cache_alloc_trace+0x2d3/0x790 [ 280.980969][T27175] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 280.986799][T27175] __memcg_init_list_lru_node+0x8a/0x1e0 [ 280.992452][T27175] __list_lru_init+0x3fe/0x710 [ 280.997234][T27175] alloc_super+0x762/0x890 [ 281.001781][T27175] sget+0x117/0x560 [ 281.005602][T27175] ? get_anon_bdev+0xc0/0xc0 [ 281.010209][T27175] ? ovl_show_options+0x550/0x550 13:03:00 executing program 4: dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/qat_adf_ctl\x00', 0x10200, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) inotify_init() r2 = socket$kcm(0x10, 0x200900000003, 0x0) sendmsg$kcm(r2, &(0x7f0000002b00)={0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000002980)="fb0000006600015bbfa9d345e7eb8d99c1ffffff0e00000043050c000000000000e2d70800000006000008b6000000801d5291636b48880665c2388d902e5ed76b8c674500000000affa33021eb82169b94b59829626cd8bb72935c922974adced71c22b987fa68c7bb731c5f64e93ea793c262f67b56acbb4bac0c47df9d0ca9bd5ad8a04c4437e99c2677d9d3ffd47893808c33b047f720f4e89978112320828c7c1fbab650cdcafa532d3524ea85b198cb49066bf549933875e91431da2f42c88d613be8f1376090e88a06412d5160d7f1b0f47d951f5f7a371a861b9390ddbad53e9b678168ac8d157a656737a7ac0226d366ccec93f9f0700", 0xfb}], 0x1}, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000140)={r1}) r3 = accept$nfc_llcp(r1, &(0x7f00000000c0), &(0x7f0000000040)=0x60) r4 = socket$vsock_stream(0x28, 0x1, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="10000000171100080000000000000080"], 0x10) getgid() ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000001c0)={'lapb0\x00', 0x2}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x2}, &(0x7f0000000240)=0x8) write$char_usb(r1, &(0x7f0000000300)="f5cb72d77f71f29b017248ec4b98c0bc977f56f93f893cd85e56803db4e9f9dfabe69b67080946cbf445e191eb1d9ed95798d6993383d5a7ef07be93bc65e58c302d6d27da4a440cebb20f2d0041d8209d38ecf39fd029a82693fce5c65c73e071f856c6fd42daff06845287739eb599344be6e0d50690d2cfcd571b77d7be7c7ebf7294e6b9fbf0b8ffbf1129b3c2bd3aa813110fcf3c15c1fa14a3052ebff896f1898923108c87e1299505b741405cc3cab28c065f7e9e59b70aa9c46e7cadbfccf59a1a0036d973b88b2cb886675d7c851204a06396e6e261caf1a2049a2e613bdd2035bfff22f7f110d2f0163838605ce7731a75", 0xf6) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000280)={r5, 0xffffffff, 0x10, 0x7, 0x7fff}, &(0x7f00000002c0)=0x18) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r4, 0x28, 0x1, &(0x7f0000000080), 0x8) 13:03:00 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x700}) 13:03:00 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x101800) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000040)={0xf, @raw_data="3fb672e846a75c737eae8eff02bc3fdc316eb50bf38a6d217bbd3b5142deecafd99000d021bee94c9a065e54663ed775da932274eb3cc06d7cd96d3483fbec873e8c9d98b7685094f438e15c0506055f010598c05fee4352cf252ceab46d1245fa5ce705dfbee1e4b92564033d04d9231d85734d0913f7204f3877925284e493f4c5157e071654a9f36b4d3e5c5ed87153f4ece3dff288fccae54c3ea37bfe798d7075e2081eac2a55c78e45012134a77189e90b09fb84dec49b481dbbc217cb44f3863257d3d870"}) ioctl$VIDIOC_TRY_FMT(r1, 0xc0d05640, &(0x7f0000000140)={0xb, @sliced={0x7, [0x100000001, 0x8001, 0x7f, 0xfffffffffffff001, 0x500, 0x0, 0x800, 0xa9, 0x707, 0x4, 0xa1, 0x726, 0x7, 0x1000, 0x47c, 0x8, 0x20, 0x800, 0x1f, 0xffff, 0x1ff, 0x4, 0x4, 0x1000, 0x8, 0xfffffffffffffffe, 0x6, 0x0, 0x0, 0xffff, 0x80000000, 0x9, 0x73a1a371, 0x1, 0x9, 0x8, 0x80000000, 0x10001, 0x7, 0x9d, 0x9, 0x5, 0x6, 0xa5, 0x9, 0x4, 0x100000000, 0x1f], 0x2856}}) getsockopt$netlink(r1, 0x10e, 0x0, &(0x7f0000000240)=""/46, &(0x7f0000000280)=0x2e) [ 281.015295][T27175] mount_nodev+0x31/0x110 [ 281.019931][T27175] ovl_mount+0x2d/0x40 [ 281.019944][T27175] ? ovl_own_xattr_set+0x10/0x10 [ 281.019959][T27175] legacy_get_tree+0x113/0x220 [ 281.019973][T27175] ? ns_capable_common+0x93/0x100 [ 281.019988][T27175] vfs_get_tree+0x8f/0x380 [ 281.020002][T27175] do_mount+0x13b3/0x1c30 [ 281.020018][T27175] ? copy_mount_string+0x40/0x40 [ 281.020046][T27175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.029051][T27175] ? copy_mount_options+0x2e8/0x3f0 [ 281.029070][T27175] ksys_mount+0xdb/0x150 [ 281.029087][T27175] __x64_sys_mount+0xbe/0x150 [ 281.029105][T27175] do_syscall_64+0xfa/0x760 [ 281.029123][T27175] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.029133][T27175] RIP: 0033:0x459829 [ 281.029148][T27175] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 281.029154][T27175] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 13:03:00 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$sock_bt_hci(r0, 0x400448e0, &(0x7f0000000040)="5a89c8ed6e2264cebdc260a620cf4c2dd40b70a8105973f8d3140da5d5c71a19194d8913a3c2395a68e3b9e619ef3b0c6c96c81f7b81379dc0c519459dc220086d") r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x0) [ 281.029167][T27175] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 281.029174][T27175] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 281.029181][T27175] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 281.029188][T27175] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 281.029196][T27175] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 [ 281.068471][T27300] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.4'. [ 281.178087][T27300] netlink: 215 bytes leftover after parsing attributes in process `syz-executor.4'. 13:03:00 executing program 3 (fault-call:13 fault-nth:20): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:00 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x301001, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000000c0)={'veth0_to_hsr\x00', {0x2, 0x4e21, @multicast2}}) ioctl$KVM_SET_XCRS(r1, 0x4188aea7, &(0x7f0000000040)={0x5, 0x6, [{0x9, 0x0, 0x4}, {0xfff, 0x0, 0x200}, {0x5, 0x0, 0x7df7178}, {0x9, 0x0, 0x3}, {0x8, 0x0, 0x401}]}) 13:03:00 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = add_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="5a934166e6246e0ac8d9ac679c8ac07fd8cacc0ac6e9d98c01faeb66d6e97b308f5b97c1c077202a3df23f6f24b85cc8010bd7daf5fd51cc59981af94db38478c721c49d8f1a1cea97375768a4e8b63a517dd1c6ec9a481a0158bc7a0aa5983e0fd7fe04a675ac27073438b6302de9624b781ee489d745bbd3580343670a300c1037e1eb8c0a287b1f95a7f99b943ebb4fc282319539c423e2ad007171a07c8bea44bff2d87f4d9059", 0xa9, 0xfffffffffffffffa) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = add_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="258bbca929ef2305ebc8377bc4c0391d5a3a0c3f7f4245fb6fba92aaa2feb257cf5ea34c2ed9e21234f674d1fd87590d9e5bf0c3bd5b94b37e2c7dd074a22b06ef57871a506e8e5bff02c655d227c7bbb48a478698e20161c09a982d40e65d2769f0f44748ff4ecdd72005ecea28b11e9faeb97cd1867b5694451cd75797bf184b80b2d267e5d7260efb373f69866644ffba2ccec6a2fbaf75d999d46414e0149530f7ffce63951b9aa9c0c3f3fc73409782535a193e47e987c62172ee4dcab2c3bab28bd7b1ab8c539d8a28ad1061e642417c16d27bd851a5079ea65a104702ad1d8194bcfffff50aeea98b40153c2ef73a8b", 0xf3, 0xfffffffffffffff9) keyctl$negate(0xd, r1, 0xac8e, r2) r3 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x2400) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') getsockopt$netrom_NETROM_N2(r3, 0x103, 0x3, &(0x7f0000000480)=0x6, &(0x7f00000004c0)=0x4) sendmsg$TIPC_NL_LINK_RESET_STATS(r3, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x58, r4, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x30}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x100000001}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x8081}, 0x4000) 13:03:00 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000080)=0x20b, 0x2bc) 13:03:00 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x3f00}) 13:03:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[]}) 13:03:00 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x4000}) 13:03:00 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[]}) 13:03:00 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x400) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f0000000080)=0x1e) [ 281.449937][T27461] FAULT_INJECTION: forcing a failure. [ 281.449937][T27461] name failslab, interval 1, probability 0, space 0, times 0 [ 281.507068][T27461] CPU: 0 PID: 27461 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 281.516304][T27461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 281.526581][T27461] Call Trace: [ 281.529976][T27461] dump_stack+0x172/0x1f0 [ 281.534317][T27461] should_fail.cold+0xa/0x15 [ 281.538915][T27461] ? fault_create_debugfs_attr+0x180/0x180 [ 281.544747][T27461] ? page_to_nid.part.0+0x20/0x20 [ 281.549795][T27461] ? ___might_sleep+0x163/0x280 [ 281.554663][T27461] __should_failslab+0x121/0x190 [ 281.559705][T27461] should_failslab+0x9/0x14 [ 281.564210][T27461] kmem_cache_alloc_trace+0x2d3/0x790 [ 281.571076][T27461] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 281.576897][T27461] __memcg_init_list_lru_node+0x8a/0x1e0 [ 281.582539][T27461] __list_lru_init+0x3fe/0x710 [ 281.587325][T27461] alloc_super+0x762/0x890 [ 281.592057][T27461] sget+0x117/0x560 [ 281.597606][T27461] ? get_anon_bdev+0xc0/0xc0 [ 281.602816][T27461] ? ovl_show_options+0x550/0x550 [ 281.607850][T27461] mount_nodev+0x31/0x110 [ 281.612268][T27461] ovl_mount+0x2d/0x40 [ 281.616343][T27461] ? ovl_own_xattr_set+0x10/0x10 [ 281.621369][T27461] legacy_get_tree+0x113/0x220 [ 281.626145][T27461] ? ns_capable_common+0x93/0x100 [ 281.631173][T27461] vfs_get_tree+0x8f/0x380 [ 281.635597][T27461] do_mount+0x13b3/0x1c30 [ 281.640289][T27461] ? copy_mount_string+0x40/0x40 [ 281.645252][T27461] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 281.651692][T27461] ? copy_mount_options+0x2e8/0x3f0 [ 281.657079][T27461] ksys_mount+0xdb/0x150 [ 281.661332][T27461] __x64_sys_mount+0xbe/0x150 [ 281.666028][T27461] do_syscall_64+0xfa/0x760 [ 281.670639][T27461] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 281.676548][T27461] RIP: 0033:0x459829 [ 281.680445][T27461] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:03:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000035c0)='/dev/zero\x00', 0x800, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000003600)={0x7bc}, 0x1) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0xfffffffffffffd89) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000080)={0x2, 0xa6}) close(r1) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200001) r3 = gettid() ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) kcmp(r3, r4, 0x0, r0, r1) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x6, 0x5, 0x8}}, 0x30) fchmod(r0, 0x101) 13:03:00 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040), 0x10298) [ 281.700166][T27461] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 281.708587][T27461] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 281.716945][T27461] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 281.725406][T27461] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 281.733750][T27461] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 281.742542][T27461] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:03:00 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0xff00}) 13:03:00 executing program 3 (fault-call:13 fault-nth:21): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:00 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x264273fedf3ee54b, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000100)={r2, 0x69}, 0x8) 13:03:01 executing program 0: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) socket$pppoe(0x18, 0x1, 0x0) 13:03:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[]}) 13:03:01 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200000, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000040)={0x3ff, 0x7, 0x5, {0x77359400}, 0x8, 0x4}) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:03:01 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x1000000}) 13:03:01 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0xc00, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:03:01 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x500000000000000}) 13:03:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[]}) 13:03:01 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x2000000}) 13:03:01 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x8, 0x10000) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r1, 0xc0145401, &(0x7f0000000040)={0x3, 0x2, 0x404, 0x0, 0xfffffffffffffe22}) recvfrom$llc(r1, &(0x7f0000000080)=""/225, 0xe1, 0x2000, &(0x7f0000000180)={0x1a, 0x10e, 0x8, 0x7, 0x4000000, 0x10001, @dev={[], 0x1e}}, 0x10) 13:03:01 executing program 0: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x20) r1 = socket$vsock_stream(0x28, 0x1, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000280)={0x0, 0x4, 0xffff, 0x3}) r3 = add_key(&(0x7f0000000100)='id_resolver\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="ed1fb619c0898e3a", 0x8, 0xfffffffffffffffe) keyctl$get_persistent(0x16, r2, r3) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000240)={0x18, 0x1, 0x0, {0x5}}, 0x18) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000000)=0x4, 0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)={0x0, 0x5, 0x4, [0x54, 0x9, 0x11, 0x9]}, &(0x7f0000000300)=0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000340)=@sack_info={r4, 0x7, 0x7}, 0xc) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$P9_RSETATTR(r5, &(0x7f0000000200)={0x7, 0x1b, 0x2}, 0x7) [ 282.240366][T27755] FAULT_INJECTION: forcing a failure. [ 282.240366][T27755] name failslab, interval 1, probability 0, space 0, times 0 [ 282.283880][T27755] CPU: 1 PID: 27755 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 282.294290][T27755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 282.305377][T27755] Call Trace: [ 282.309022][T27755] dump_stack+0x172/0x1f0 [ 282.313459][T27755] should_fail.cold+0xa/0x15 [ 282.318065][T27755] ? fault_create_debugfs_attr+0x180/0x180 [ 282.324362][T27755] ? page_to_nid.part.0+0x20/0x20 [ 282.329488][T27755] ? ___might_sleep+0x163/0x280 [ 282.334615][T27755] __should_failslab+0x121/0x190 [ 282.339565][T27755] should_failslab+0x9/0x14 [ 282.344344][T27755] kmem_cache_alloc_trace+0x2d3/0x790 [ 282.349724][T27755] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 282.355541][T27755] __memcg_init_list_lru_node+0x8a/0x1e0 [ 282.361374][T27755] __list_lru_init+0x3fe/0x710 [ 282.366590][T27755] alloc_super+0x762/0x890 [ 282.371021][T27755] sget+0x117/0x560 [ 282.374836][T27755] ? get_anon_bdev+0xc0/0xc0 [ 282.379446][T27755] ? ovl_show_options+0x550/0x550 [ 282.384501][T27755] mount_nodev+0x31/0x110 [ 282.388947][T27755] ovl_mount+0x2d/0x40 [ 282.393379][T27755] ? ovl_own_xattr_set+0x10/0x10 [ 282.398349][T27755] legacy_get_tree+0x113/0x220 [ 282.403220][T27755] ? ns_capable_common+0x93/0x100 [ 282.408457][T27755] vfs_get_tree+0x8f/0x380 [ 282.412894][T27755] do_mount+0x13b3/0x1c30 [ 282.417259][T27755] ? copy_mount_string+0x40/0x40 [ 282.422217][T27755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 282.429311][T27755] ? copy_mount_options+0x2e8/0x3f0 [ 282.434666][T27755] ksys_mount+0xdb/0x150 [ 282.439184][T27755] __x64_sys_mount+0xbe/0x150 [ 282.444271][T27755] do_syscall_64+0xfa/0x760 [ 282.449372][T27755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 282.456398][T27755] RIP: 0033:0x459829 [ 282.460359][T27755] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 282.482315][T27755] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 282.491223][T27755] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 282.499474][T27755] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 282.507803][T27755] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 282.516496][T27755] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 282.528587][T27755] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:03:01 executing program 3 (fault-call:13 fault-nth:22): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:01 executing program 4: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x40000, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @rand_addr, @local}, &(0x7f00000000c0)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000140)={r1, 0x1, 0x6, @random="2b8b725b20b2"}, 0x10) write$FUSE_LSEEK(r0, &(0x7f0000000280)={0x18, 0x0, 0x6}, 0x18) r2 = socket$vsock_stream(0x28, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) flistxattr(r3, &(0x7f0000000180)=""/215, 0xd7) ioctl$SG_SET_FORCE_PACK_ID(r3, 0x227b, &(0x7f0000000100)) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000000), 0x8) recvmsg$kcm(r0, &(0x7f00000004c0)={&(0x7f00000002c0)=@in6={0xa, 0x0, 0x0, @empty}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)=""/187, 0xbb}], 0x1, &(0x7f0000000440)=""/104, 0x68}, 0x2) 13:03:01 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[]}) 13:03:01 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x3000000}) 13:03:01 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, 0x0) 13:03:01 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x5, 0x228000) mq_timedsend(r1, &(0x7f00000000c0)="7ae35579b66d6655619030fca795bb07eef55a238314ad7c13c943964a91230482895741932b955a7cb7a1f6a3995e9fc44e52eedeb132930a3019c69b1147e1305ee11869958bad5e55a2123a7b7b0c08619c85dcac40b7e54b050e2f89670c41b8c59aaa8359abcecc6e49fdd20947a911586db791d99898ae82c6d382ac9e5f397646c0a49a66261a3011516f1f4df0b9881df9258c44a10781ec6754fb0057e6b4916c7fe7806c0aec7eae3affe2205b8f8613b402446d9c6cff11cf9201d144de0859f798391bc83779f242e8b58c709ab8df18aa260093acf3cd53118221f83e203bcbc182c528f6bf8e8232a6acb547dda506edcb60", 0xf9, 0x1583, &(0x7f00000001c0)) ioctl$TUNATTACHFILTER(r1, 0x401054d5, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x7, 0x2, 0x80, 0x6}, {0x3, 0xfff, 0x7, 0x1000}, {0x7, 0x20, 0x8, 0x1000}]}) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000200)={0x85b4, 0x4, 0x0, 0xb05a}) 13:03:01 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x2, 0x0) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f0000000080)=0xffff) 13:03:01 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x4000000}) 13:03:02 executing program 1: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x880, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000001040)={&(0x7f0000000040)=""/4096, 0x0, 0x1000, 0x6}, 0x18) ioctl$sock_bt_bnep_BNEPCONNDEL(r0, 0x400442c9, &(0x7f0000001080)={0x2, @remote}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) prctl$PR_SET_FPEXC(0xc, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x0) 13:03:02 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = getpgid(0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, 0x0) 13:03:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[]}) [ 282.940322][T28010] FAULT_INJECTION: forcing a failure. [ 282.940322][T28010] name failslab, interval 1, probability 0, space 0, times 0 13:03:02 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x5000000}) [ 283.030228][T28010] CPU: 0 PID: 28010 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 283.039375][T28010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.049442][T28010] Call Trace: [ 283.052747][T28010] dump_stack+0x172/0x1f0 [ 283.057129][T28010] should_fail.cold+0xa/0x15 [ 283.061738][T28010] ? fault_create_debugfs_attr+0x180/0x180 [ 283.067561][T28010] ? page_to_nid.part.0+0x20/0x20 [ 283.067576][T28010] ? ___might_sleep+0x163/0x280 [ 283.067590][T28010] __should_failslab+0x121/0x190 [ 283.067606][T28010] should_failslab+0x9/0x14 [ 283.067617][T28010] kmem_cache_alloc_trace+0x2d3/0x790 [ 283.067639][T28010] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 283.098087][T28010] __memcg_init_list_lru_node+0x8a/0x1e0 [ 283.103734][T28010] __list_lru_init+0x3fe/0x710 [ 283.108517][T28010] alloc_super+0x762/0x890 [ 283.108534][T28010] sget+0x117/0x560 [ 283.108546][T28010] ? get_anon_bdev+0xc0/0xc0 [ 283.108563][T28010] ? ovl_show_options+0x550/0x550 [ 283.108584][T28010] mount_nodev+0x31/0x110 [ 283.126422][T28010] ovl_mount+0x2d/0x40 [ 283.126438][T28010] ? ovl_own_xattr_set+0x10/0x10 [ 283.126461][T28010] legacy_get_tree+0x113/0x220 [ 283.144621][T28010] ? ns_capable_common+0x93/0x100 [ 283.149663][T28010] vfs_get_tree+0x8f/0x380 [ 283.154103][T28010] do_mount+0x13b3/0x1c30 [ 283.158448][T28010] ? copy_mount_string+0x40/0x40 [ 283.163405][T28010] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.169664][T28010] ? copy_mount_options+0x2e8/0x3f0 [ 283.174881][T28010] ksys_mount+0xdb/0x150 [ 283.179136][T28010] __x64_sys_mount+0xbe/0x150 [ 283.183829][T28010] do_syscall_64+0xfa/0x760 [ 283.188371][T28010] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.194259][T28010] RIP: 0033:0x459829 [ 283.198440][T28010] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 283.198447][T28010] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 283.198459][T28010] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 283.198465][T28010] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 283.198471][T28010] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 283.198478][T28010] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 283.198484][T28010] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:03:02 executing program 3 (fault-call:13 fault-nth:23): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:02 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0x10b, 0x1, 0x10000, "c311740928f5a1b684d2eb049373b5a7", "9e506909fe29d8a8b65374990b308c26471085aca1c4a04689f436156f29a67b936beb8d60016d691668fd1595580bbc791888e8f5e9d076ccd5c3cf0be26501acf83f29def62efe153e0ddf6a9095e3d9978b928d5ebeb58fbf42016e05d8ceb95f8317af9397074a6973e4fa5eb4c5325c6075422c499bccf7d25c5b097082cbef09420313d1798df312826420070c235bc7f9c035bb727cb816fefe72a8618ca074213b07a7039ceeaf14d9bb4953290c3d8c35da24119eb3435baa0b31bd44acbdec12248561e2233305f9c6cf44b5327ce89910e486a9b3c4a840552304736a0bb4586c5e28330eca289f34993aec7ca7b73677"}, 0x10b, 0x1) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:03:02 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x6000000}) 13:03:02 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e23, @multicast2}, 0x10) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r1, 0x800448d2, &(0x7f00000003c0)={0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}]}) ioctl$SIOCGETNODEID(r1, 0x89e1, &(0x7f0000000440)={0x1}) openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0xa2c02, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) 13:03:02 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x0, 0x1, 0x0, 0x4}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) fcntl$setstatus(r0, 0x4, 0x80000000002c00) 13:03:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[]}) 13:03:02 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x7000000}) 13:03:02 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000280), 0x0) getpid() sched_setattr(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f0000000340)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) semget$private(0x0, 0x3, 0x100) pipe(&(0x7f00000001c0)) syz_open_dev$loop(0x0, 0x200, 0x2403) memfd_create(0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x0, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r6 = dup(0xffffffffffffffff) write$UHID_INPUT2(r5, &(0x7f0000000340)=ANY=[], 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r6, 0x40505330, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(0xffffffffffffffff, r1, 0x80000) ioctl$KDSETLED(r4, 0x4b32, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r7, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r7, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000740)="5d5f43a474c40329b5fbcff1d0675020e456e97c329ef11fad7ec67f4b3619c519011f62595720bffbf698dfddae62eedbfa8a21b36b8315cd93d85e1b2a84a3178fb56f85583d67874b55c9c6d979064684265e748fdc426642", 0x5a) socket$packet(0x11, 0x1, 0x300) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:03:02 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x8000000}) 13:03:02 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[]}) 13:03:02 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x408000) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f00000000c0), &(0x7f0000000080)=0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) [ 283.695895][T28212] FAULT_INJECTION: forcing a failure. [ 283.695895][T28212] name failslab, interval 1, probability 0, space 0, times 0 13:03:02 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x3f000000}) [ 283.752719][T28212] CPU: 0 PID: 28212 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 283.762059][T28212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 283.772235][T28212] Call Trace: [ 283.775534][T28212] dump_stack+0x172/0x1f0 [ 283.779878][T28212] should_fail.cold+0xa/0x15 [ 283.784484][T28212] ? fault_create_debugfs_attr+0x180/0x180 [ 283.790315][T28212] ? page_to_nid.part.0+0x20/0x20 [ 283.795363][T28212] ? ___might_sleep+0x163/0x280 [ 283.800235][T28212] __should_failslab+0x121/0x190 [ 283.805189][T28212] should_failslab+0x9/0x14 [ 283.809712][T28212] kmem_cache_alloc_trace+0x2d3/0x790 [ 283.815129][T28212] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 283.820955][T28212] __memcg_init_list_lru_node+0x8a/0x1e0 [ 283.826606][T28212] __list_lru_init+0x3fe/0x710 [ 283.831401][T28212] alloc_super+0x762/0x890 [ 283.835831][T28212] sget+0x117/0x560 [ 283.839659][T28212] ? get_anon_bdev+0xc0/0xc0 [ 283.844360][T28212] ? ovl_show_options+0x550/0x550 [ 283.849398][T28212] mount_nodev+0x31/0x110 [ 283.853739][T28212] ovl_mount+0x2d/0x40 [ 283.857819][T28212] ? ovl_own_xattr_set+0x10/0x10 [ 283.862768][T28212] legacy_get_tree+0x113/0x220 [ 283.867553][T28212] vfs_get_tree+0x8f/0x380 [ 283.871980][T28212] do_mount+0x13b3/0x1c30 [ 283.876347][T28212] ? __this_cpu_preempt_check+0x3a/0x210 [ 283.876368][T28212] ? copy_mount_string+0x40/0x40 [ 283.876384][T28212] ? copy_mount_options+0x270/0x3f0 [ 283.876400][T28212] ? copy_mount_options+0x1fb/0x3f0 [ 283.876426][T28212] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 283.892182][T28212] ? copy_mount_options+0x2e8/0x3f0 [ 283.892200][T28212] ksys_mount+0xdb/0x150 [ 283.892218][T28212] __x64_sys_mount+0xbe/0x150 [ 283.892236][T28212] do_syscall_64+0xfa/0x760 [ 283.892256][T28212] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 283.892282][T28212] RIP: 0033:0x459829 [ 283.932239][T28212] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 13:03:03 executing program 3 (fault-call:13 fault-nth:24): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:03 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x40000000}) [ 283.951928][T28212] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 283.960345][T28212] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 283.960353][T28212] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 283.960359][T28212] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 283.960366][T28212] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 283.960372][T28212] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:03:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)={0x30, 0x0, 0x31c, 0x0, 0x0, {{}, 0x0, 0x5, 0x0, {0x14}}}, 0x30}}, 0x0) recvmsg(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000007c0)=""/138, 0x8a}, {&(0x7f0000000580)=""/244, 0xf4}, {&(0x7f0000000300)=""/162, 0xa2}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f00000027c0)=""/129, 0x81}], 0x83}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000004200050100000000e7fffffe00000000"], 0x14}}, 0x0) 13:03:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[]}) 13:03:03 executing program 1: r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x2, 0x400000) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x1f) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x803, 0x0) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000017c0)="23000000560081aee4f80b00000f00fe078bc36f16000072fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x2, 0x20000) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x2) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x101000, 0x0) ioctl$KDDELIO(r2, 0x4b35, 0x1) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r5, 0x81785501, &(0x7f00000000c0)=""/6) close(r1) ioctl$TIOCGDEV(r4, 0x80045432, &(0x7f0000000240)) r6 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$KVM_GET_MP_STATE(r5, 0x8004ae98, &(0x7f0000000200)) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r6, 0x28, 0x1, 0x0, 0x0) 13:03:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8, 0x200000) bind$ax25(r1, &(0x7f00000000c0)={{0x3, @default, 0x3}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default]}, 0x48) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)={0x18, 0x20000000000036, 0x11d, 0x0, 0x0, {0x3801}, [@nested={0x4}]}, 0x18}}, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000140)) r2 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:03:03 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0xff000000}) 13:03:03 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xf7c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fremovexattr(r0, &(0x7f0000001400)=@known='trusted.overlay.upper\x00') 13:03:03 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[]}) 13:03:03 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x80000, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x80400, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000080)='%selinux', &(0x7f00000000c0)='./file0\x00', r1) socket$pppoe(0x18, 0x1, 0x0) [ 284.243291][T28399] FAULT_INJECTION: forcing a failure. [ 284.243291][T28399] name failslab, interval 1, probability 0, space 0, times 0 [ 284.293810][T28399] CPU: 1 PID: 28399 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 284.303044][T28399] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.313197][T28399] Call Trace: [ 284.316511][T28399] dump_stack+0x172/0x1f0 [ 284.320878][T28399] should_fail.cold+0xa/0x15 [ 284.325497][T28399] ? fault_create_debugfs_attr+0x180/0x180 [ 284.331340][T28399] ? page_to_nid.part.0+0x20/0x20 [ 284.336395][T28399] ? ___might_sleep+0x163/0x280 [ 284.341286][T28399] __should_failslab+0x121/0x190 [ 284.341306][T28399] should_failslab+0x9/0x14 [ 284.341321][T28399] kmem_cache_alloc_trace+0x2d3/0x790 [ 284.341337][T28399] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 284.341367][T28399] __memcg_init_list_lru_node+0x8a/0x1e0 [ 284.362367][T28399] __list_lru_init+0x3fe/0x710 [ 284.362386][T28399] alloc_super+0x762/0x890 [ 284.362405][T28399] sget+0x117/0x560 [ 284.362420][T28399] ? get_anon_bdev+0xc0/0xc0 [ 284.362437][T28399] ? ovl_show_options+0x550/0x550 [ 284.362461][T28399] mount_nodev+0x31/0x110 [ 284.395034][T28399] ovl_mount+0x2d/0x40 [ 284.395052][T28399] ? ovl_own_xattr_set+0x10/0x10 [ 284.395070][T28399] legacy_get_tree+0x113/0x220 [ 284.395086][T28399] ? ns_capable_common+0x93/0x100 [ 284.395116][T28399] vfs_get_tree+0x8f/0x380 [ 284.418524][T28399] do_mount+0x13b3/0x1c30 [ 284.422872][T28399] ? copy_mount_string+0x40/0x40 [ 284.422897][T28399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.422913][T28399] ? copy_mount_options+0x2e8/0x3f0 [ 284.422932][T28399] ksys_mount+0xdb/0x150 [ 284.422950][T28399] __x64_sys_mount+0xbe/0x150 [ 284.422976][T28399] do_syscall_64+0xfa/0x760 [ 284.452932][T28399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 284.458870][T28399] RIP: 0033:0x459829 [ 284.458887][T28399] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 284.458893][T28399] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 13:03:03 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x100000000000000}) [ 284.458906][T28399] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 284.458915][T28399] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 284.458923][T28399] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 284.458932][T28399] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 284.458940][T28399] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:03:03 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = socket(0xa, 0x800, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x5, @loopback, 0xead}, @in6={0xa, 0x4e24, 0x100, @loopback, 0x4}, @in6={0xa, 0x4e21, 0x10001, @mcast2, 0x8000}, @in6={0xa, 0x4e21, 0x0, @mcast2, 0x1ff}, @in={0x2, 0x401, @broadcast}, @in6={0xa, 0x4e21, 0x100, @loopback, 0x9}, @in={0x2, 0x4e24, @local}], 0xac) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) 13:03:03 executing program 3 (fault-call:13 fault-nth:25): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:03 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x200000000000000}) 13:03:03 executing program 0: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r0, 0x40045201, &(0x7f0000000080)=0x1) 13:03:03 executing program 4: syz_open_dev$ndb(&(0x7f0000000100)='/dev/nbd#\x00', 0x0, 0x400200) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000000)) write$P9_RUNLINKAT(r1, &(0x7f0000000080)={0x7, 0x4d, 0x1}, 0x7) r2 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000140), 0x8) acct(0x0) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000180)) [ 284.828244][T28438] FAULT_INJECTION: forcing a failure. [ 284.828244][T28438] name failslab, interval 1, probability 0, space 0, times 0 [ 284.957191][T28438] CPU: 0 PID: 28438 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 284.966335][T28438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 284.976596][T28438] Call Trace: [ 284.979905][T28438] dump_stack+0x172/0x1f0 [ 284.984260][T28438] should_fail.cold+0xa/0x15 [ 284.988858][T28438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 284.995122][T28438] ? fault_create_debugfs_attr+0x180/0x180 [ 285.000952][T28438] ? page_to_nid.part.0+0x20/0x20 [ 285.005999][T28438] ? ___might_sleep+0x163/0x280 [ 285.010889][T28438] __should_failslab+0x121/0x190 [ 285.015871][T28438] should_failslab+0x9/0x14 [ 285.020388][T28438] kmem_cache_alloc_node_trace+0x274/0x750 [ 285.026213][T28438] ? kasan_kmalloc+0x9/0x10 [ 285.030730][T28438] ? kmem_cache_alloc_trace+0x346/0x790 [ 285.036554][T28438] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 285.042382][T28438] __kmalloc_node+0x3d/0x70 [ 285.046929][T28438] kvmalloc_node+0x68/0x100 [ 285.051441][T28438] __list_lru_init+0x4d5/0x710 [ 285.056226][T28438] alloc_super+0x762/0x890 [ 285.060665][T28438] sget+0x117/0x560 [ 285.064478][T28438] ? get_anon_bdev+0xc0/0xc0 [ 285.069077][T28438] ? ovl_show_options+0x550/0x550 [ 285.074113][T28438] mount_nodev+0x31/0x110 [ 285.078459][T28438] ovl_mount+0x2d/0x40 [ 285.082542][T28438] ? ovl_own_xattr_set+0x10/0x10 [ 285.087499][T28438] legacy_get_tree+0x113/0x220 [ 285.092279][T28438] ? ns_capable_common+0x93/0x100 [ 285.097313][T28438] vfs_get_tree+0x8f/0x380 [ 285.101746][T28438] do_mount+0x13b3/0x1c30 [ 285.106121][T28438] ? copy_mount_string+0x40/0x40 [ 285.111080][T28438] ? copy_mount_options+0x270/0x3f0 [ 285.116297][T28438] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 285.122564][T28438] ? copy_mount_options+0x2e8/0x3f0 [ 285.127792][T28438] ksys_mount+0xdb/0x150 [ 285.132049][T28438] __x64_sys_mount+0xbe/0x150 [ 285.136747][T28438] do_syscall_64+0xfa/0x760 [ 285.141279][T28438] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.147209][T28438] RIP: 0033:0x459829 [ 285.151114][T28438] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.170723][T28438] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 285.179140][T28438] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 285.187204][T28438] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 285.195184][T28438] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 285.203206][T28438] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 285.211197][T28438] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 13:03:04 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x300000000000000}) 13:03:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[]}) 13:03:04 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_pts(r0, 0x800) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000000)=""/189) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:03:04 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x400, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f0000000140)="2156a253273a7ea38d19", &(0x7f0000000180)=""/218}, 0x18) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x80, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x0, &(0x7f0000000080)={@loopback}, &(0x7f00000000c0)=0x14) 13:03:04 executing program 3 (fault-call:13 fault-nth:26): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:04 executing program 0: r0 = socket(0x10, 0x800000000000803, 0x0) sendto(r0, &(0x7f0000000000)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000002040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 13:03:04 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x400000000000000}) 13:03:04 executing program 4: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000), 0x8) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x9, 0x40000) ioctl$TCSBRK(r1, 0x5409, 0x1) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r1, 0x80dc5521, &(0x7f0000000080)=""/36) 13:03:04 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[]}) 13:03:04 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) write$cgroup_int(0xffffffffffffffff, &(0x7f00000000c0), 0x12) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\xcd\x94\xa4\x84\x00\b\x00\x00\x00\x00\x00\x00]\v\xbf\x9a\xcb') r2 = openat$cgroup_ro(r1, &(0x7f0000000440)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000400)='./bus\x00', 0x0) keyctl$assume_authority(0x10, 0x0) ftruncate(r3, 0x208200) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, 0x0) r4 = open(0x0, 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x10, r4, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) preadv(r2, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) fadvise64(r3, 0x0, 0x0, 0x0) getgid() 13:03:04 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x500000000000000}) 13:03:04 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) ioctl$VIDIOC_G_MODULATOR(r0, 0xc0445636, &(0x7f0000000000)={0x4, "4f6115ced9be0e5aa603dfdb278860bf6c3586a8fcffef3456b522433e7a3db4", 0x4, 0x1515, 0x3, 0x10, 0x2}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000000c0)) 13:03:04 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) write$cgroup_int(r0, &(0x7f00000000c0), 0x12) write$FUSE_OPEN(r0, &(0x7f0000000100)={0x366}, 0x20) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='\x00\xcd\x94\xa4\x84\x00\b\x00\x00\x00\x00\x00\x00]\v\xbf\x9a\xcb') r3 = openat$cgroup_ro(r2, &(0x7f0000000440)='mem\x00\x01y7swaS.cur\x89\xc9B\xab\xe3\xfarent\x00', 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000400)='./bus\x00', 0x0) r5 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r5) ftruncate(r4, 0x208200) fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000000340)=0x3) pipe(&(0x7f0000000480)) r6 = open(&(0x7f0000000200)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x7ffffe, 0x4002011, r6, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$DRM_IOCTL_CONTROL(r3, 0x40086414, &(0x7f0000000240)={0x1, 0x8001}) preadv(r3, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/81, 0x20000111}], 0x1, 0x2000107c) write$FUSE_LSEEK(r2, &(0x7f0000000300)={0x18, 0x0, 0x3, {0x7fffffff}}, 0x18) request_key(0x0, 0x0, 0x0, 0xfffffffffffffffe) fadvise64(r4, 0x0, 0x7b94, 0x4) getgid() [ 285.678512][T28576] FAULT_INJECTION: forcing a failure. [ 285.678512][T28576] name failslab, interval 1, probability 0, space 0, times 0 [ 285.771449][T28576] CPU: 0 PID: 28576 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 285.780592][T28576] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 285.790655][T28576] Call Trace: [ 285.793965][T28576] dump_stack+0x172/0x1f0 [ 285.798317][T28576] should_fail.cold+0xa/0x15 [ 285.802944][T28576] ? fault_create_debugfs_attr+0x180/0x180 [ 285.808760][T28576] __should_failslab+0x121/0x190 [ 285.813714][T28576] should_failslab+0x9/0x14 13:03:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[]}) [ 285.818228][T28576] kmem_cache_alloc_node_trace+0x274/0x750 [ 285.824044][T28576] ? kasan_kmalloc+0x9/0x10 [ 285.828580][T28576] ? kmem_cache_alloc_trace+0x346/0x790 [ 285.834164][T28576] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 13:03:05 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x600000000000000}) [ 285.834181][T28576] __kmalloc_node+0x3d/0x70 [ 285.834198][T28576] kvmalloc_node+0x68/0x100 [ 285.834213][T28576] __list_lru_init+0x4d5/0x710 [ 285.834232][T28576] alloc_super+0x762/0x890 [ 285.834249][T28576] sget+0x117/0x560 [ 285.834263][T28576] ? get_anon_bdev+0xc0/0xc0 [ 285.834279][T28576] ? ovl_show_options+0x550/0x550 13:03:05 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x700000000000000}) [ 285.834294][T28576] mount_nodev+0x31/0x110 [ 285.834308][T28576] ovl_mount+0x2d/0x40 [ 285.834323][T28576] ? ovl_own_xattr_set+0x10/0x10 [ 285.834338][T28576] legacy_get_tree+0x113/0x220 13:03:05 executing program 3 (fault-call:13 fault-nth:27): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[]}) 13:03:05 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x800000000000000}) [ 285.834353][T28576] ? ns_capable_common+0x93/0x100 [ 285.834369][T28576] vfs_get_tree+0x8f/0x380 [ 285.834385][T28576] do_mount+0x13b3/0x1c30 [ 285.834403][T28576] ? copy_mount_string+0x40/0x40 13:03:05 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuseblk\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 285.834422][T28576] ? __sanitizer_cov_trace_const_cmp8+0x1/0x20 [ 285.834437][T28576] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 13:03:05 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[]}) [ 285.834452][T28576] ? copy_mount_options+0x2e8/0x3f0 [ 285.834469][T28576] ksys_mount+0xdb/0x150 [ 285.834501][T28576] __x64_sys_mount+0xbe/0x150 [ 285.834514][T28576] ? ksys_mount+0x150/0x150 13:03:05 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x3f00000000000000}) [ 285.834532][T28576] do_syscall_64+0xfa/0x760 [ 285.834552][T28576] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 285.834563][T28576] RIP: 0033:0x459829 13:03:05 executing program 3 (fault-call:13 fault-nth:28): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 285.834578][T28576] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 285.834586][T28576] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 285.834600][T28576] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 285.834608][T28576] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 285.834616][T28576] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 285.834624][T28576] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 285.834632][T28576] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 [ 286.521274][T28831] FAULT_INJECTION: forcing a failure. [ 286.521274][T28831] name failslab, interval 1, probability 0, space 0, times 0 [ 286.521305][T28831] CPU: 1 PID: 28831 Comm: syz-executor.3 Not tainted 5.3.0-rc3-next-20190809 #63 [ 286.521315][T28831] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 286.521320][T28831] Call Trace: [ 286.521344][T28831] dump_stack+0x172/0x1f0 [ 286.521367][T28831] should_fail.cold+0xa/0x15 [ 286.521386][T28831] ? fault_create_debugfs_attr+0x180/0x180 [ 286.521406][T28831] ? page_to_nid.part.0+0x20/0x20 [ 286.521425][T28831] ? ___might_sleep+0x163/0x280 [ 286.521446][T28831] __should_failslab+0x121/0x190 [ 286.521465][T28831] should_failslab+0x9/0x14 [ 286.521481][T28831] kmem_cache_alloc_trace+0x2d3/0x790 [ 286.521497][T28831] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 286.521515][T28831] __memcg_init_list_lru_node+0x8a/0x1e0 [ 286.521531][T28831] __list_lru_init+0x3fe/0x710 [ 286.521549][T28831] alloc_super+0x762/0x890 [ 286.521567][T28831] sget+0x117/0x560 [ 286.521582][T28831] ? get_anon_bdev+0xc0/0xc0 [ 286.521601][T28831] ? ovl_show_options+0x550/0x550 [ 286.521618][T28831] mount_nodev+0x31/0x110 [ 286.521636][T28831] ovl_mount+0x2d/0x40 [ 286.521654][T28831] ? ovl_own_xattr_set+0x10/0x10 [ 286.521670][T28831] legacy_get_tree+0x113/0x220 [ 286.521687][T28831] ? ns_capable_common+0x93/0x100 [ 286.521706][T28831] vfs_get_tree+0x8f/0x380 13:03:05 executing program 0: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x12) [ 286.521726][T28831] do_mount+0x13b3/0x1c30 [ 286.521748][T28831] ? copy_mount_string+0x40/0x40 [ 286.521765][T28831] ? copy_mount_options+0x241/0x3f0 [ 286.521783][T28831] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 286.521803][T28831] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 286.521820][T28831] ? copy_mount_options+0x2e8/0x3f0 [ 286.521840][T28831] ksys_mount+0xdb/0x150 [ 286.521859][T28831] __x64_sys_mount+0xbe/0x150 [ 286.521877][T28831] do_syscall_64+0xfa/0x760 [ 286.521897][T28831] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 286.521908][T28831] RIP: 0033:0x459829 [ 286.521924][T28831] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 286.521932][T28831] RSP: 002b:00007fe9d0d6ac78 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 286.521949][T28831] RAX: ffffffffffffffda RBX: 00007fe9d0d6ac90 RCX: 0000000000459829 [ 286.521967][T28831] RDX: 00000000200000c0 RSI: 0000000020000000 RDI: 000000000040000a [ 286.521977][T28831] RBP: 000000000075bf20 R08: 0000000020000100 R09: 0000000000000000 [ 286.521987][T28831] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fe9d0d6b6d4 [ 286.521996][T28831] R13: 00000000004c5e44 R14: 00000000004da948 R15: 0000000000000004 [ 286.561677][T28833] fuse: Bad value for 'subtype' [ 286.590548][T28837] fuse: Bad value for 'subtype' 13:03:06 executing program 4: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x1, 0x3}, 0x0) semget$private(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0xff7ffffffffffffc, 0x0) r1 = dup(0xffffffffffffffff) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.swap.current\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000683000/0x1000)=nil, 0x1000, 0x100000c, 0x81813, r1, 0x0) 13:03:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0x4000000000000000}) 13:03:06 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[]}) 13:03:06 executing program 1: r0 = msgget$private(0x0, 0x10) msgsnd(r0, &(0x7f0000000100)=ANY=[], 0x0, 0x800) socket$vsock_stream(0x28, 0x1, 0x0) 13:03:06 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x1, 0x3}, 0x0) semget$private(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0xff7ffffffffffffc, 0x0) r1 = dup(0xffffffffffffffff) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r2, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, 0x0) openat$cgroup_ro(r2, &(0x7f0000000240)='memory.swap.current\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000683000/0x1000)=nil, 0x1000, 0x100000c, 0x10, r1, 0x0) 13:03:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x0, 0xff00000000000000}) 13:03:06 executing program 1: r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @random}}, &(0x7f0000000080)=0x80) setsockopt$inet_group_source_req(r0, 0x0, 0x2c, &(0x7f00000000c0)={0x94b3, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {{0x2, 0x4e23, @multicast1}}}, 0x108) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x0) setsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000200)=0x1, 0x4) 13:03:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[]}) [ 287.321342][T28864] overlayfs: conflicting lowerdir path 13:03:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) migrate_pages(r1, 0x0, &(0x7f0000000140)=0x30, &(0x7f0000000180)=0x6) openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x8000, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x2000, 0x0) 13:03:06 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[]}) 13:03:06 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x400002, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='io\x00') flistxattr(0xffffffffffffffff, 0x0, 0x0) r1 = gettid() pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) ioctl$FIBMAP(0xffffffffffffffff, 0x1, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x9}}, 0x0) bind$unix(r0, 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) tkill(r1, 0x1000000000016) 13:03:06 executing program 0: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x1, 0x3}, 0x0) semget$private(0x0, 0x0, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0xff7ffffffffffffc, 0x0) write$UHID_INPUT2(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x10, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, 0x0) openat$cgroup_ro(r1, &(0x7f0000000240)='memory.swap.current\x00', 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) mmap(&(0x7f0000683000/0x1000)=nil, 0x1000, 0x100000c, 0x81813, 0xffffffffffffffff, 0x0) 13:03:06 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x947c4a0fb9cc8288}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="b0000000", @ANYRES16=r1, @ANYBLOB="000308000000fedbdf250a0000007c00030008000500e000000114000600fe8000000200000000000000000000bb08000800020000000800080001000000080007004e2300001400020065727370616e30000000000000000000080004000700000014000600fe8000000000000000000000000000aa140006001543ce9181c07221b7a430d1037e4ba108000500000000001800010014000300fe800000f3ff000000000000000000aa"], 0xb0}, 0x1, 0x0, 0x0, 0x40800}, 0x40) 13:03:06 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x80, 0x8000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000180)={@mcast2, 0x5d, r2}) 13:03:06 executing program 2: openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) [ 287.780883][T29097] overlayfs: workdir and upperdir must reside under the same mount [ 287.829174][T29109] overlayfs: workdir and upperdir must reside under the same mount 13:03:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x400003, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:07 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000100)={{0x20, 0x8001}, 'port0\x00', 0x2, 0x1000, 0x719, 0xe9a5, 0x0, 0x0, 0x596, 0x0, 0x2}) 13:03:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[]}) 13:03:07 executing program 4: io_setup(0x1b4b, &(0x7f0000000100)) io_setup(0x100000001, &(0x7f0000000000)=0x0) io_destroy(r0) io_submit(r0, 0x0, 0x0) 13:03:07 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) 13:03:07 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{}, {}, {}]}) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)={r0, 0x80, 0x2f44, "5bfdef34d8b6143e4810cde7c41f95c4caaaac5904129a58ed252e68e521261781a15f076bf354bc6be63fa741e06532510781b37460a6e1f3d4d06847f50e45e03298da14a90ca9f125ca1d61450f778eaa9033a6eb2c97098c5fa1392ee095eb5585252ebe"}) 13:03:07 executing program 0: perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0x16, 0x0, &(0x7f0000000200)="263abd030e0ef7fa1578bd6688a8655c88a878f71880", 0x0, 0x6}, 0x28) 13:03:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[]}) [ 288.262246][T29225] overlayfs: workdir and upperdir must reside under the same mount 13:03:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0xffffff9d, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="20000000100029080000000000000010030100000c000200083655ff793ddc091e44bd1a150000000000000048f33f9b218a3f9d3b55fce7b7c270802fb2ab98261747984e5eea510b6ce5a34d65838ffa77f49a45caf02fe122013761506f1b44b7a39463fc8b1893ea77e80f1c268de134b858edd6c8454f563b3f3ad9b007fe00e40786686a900696a67d63f0394b6f3e7d5f8ff9e41d19dcbc012cd49d0ed624fc3a248159324c7dc9b2b89300c8b55d"], 0x20}}, 0x0) 13:03:07 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40801, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r0, 0x6, 0x2, &(0x7f0000000080), &(0x7f0000000140)=0x6) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009404, &(0x7f00000000c0)) r2 = msgget(0x1, 0x41) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000180)=""/189) 13:03:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x400004, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:07 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) clock_gettime(0x0, &(0x7f0000000000)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f00000000c0)={0x77359400}, 0x10) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0xfffffffffffffef7) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x200, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000140)=0x80000001, 0x4) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000080)=0x8) fcntl$getown(r0, 0x9) 13:03:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[]}) 13:03:07 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x102000500000004b, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x33) getsockopt$inet6_opts(r1, 0x29, 0x39, 0x0, &(0x7f0000000000)=0xfffffec9) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") [ 288.557761][T29368] overlayfs: conflicting lowerdir path 13:03:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x01\x00', &(0x7f0000000040)=ANY=[]}) 13:03:07 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x800, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@mcast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) sendmsg$can_raw(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x1d, r2}, 0xfffffffffffffe35, &(0x7f00000002c0)={&(0x7f00000001c0)=@can={{0x3, 0x9, 0xbb, 0x9}, 0x0, 0x1, 0x0, 0x0, "aaa3e736dfab97a5"}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x80) 13:03:07 executing program 0: creat(&(0x7f00000000c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000001c0)='./file0\x00', 0x0, 0x2001001, 0x0) unlink(&(0x7f0000000640)='./file0\x00') [ 288.642175][T29368] overlayfs: workdir and upperdir must reside under the same mount 13:03:07 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x400005, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:07 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x10000000000, 0x0) recvfrom$x25(r0, &(0x7f0000000040)=""/250, 0xfa, 0x3, &(0x7f0000000140)={0x9, @remote={[], 0x1}}, 0x12) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x0) connect$vsock_stream(r0, &(0x7f0000000180)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 13:03:07 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[]}) 13:03:08 executing program 2: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000080)={0xa97, 0xea6, 0x9, 0x5}, 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f00000003c0)={&(0x7f0000000100), 0xc, &(0x7f0000000380)={&(0x7f0000000140)={0x228, 0x0, 0x3b9feceb5ee471d, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0xd8, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xed5}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffff81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xda}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0xd4, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffffff6091f3a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb754}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x72a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x12000}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}]}]}, 0x228}, 0x1, 0x0, 0x0, 0x20008000}, 0x5072f10551658c26) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009404, &(0x7f00000000c0)) r2 = shmget(0x3, 0x3000, 0x403, &(0x7f0000ffb000/0x3000)=nil) shmat(r2, &(0x7f0000ffb000/0x4000)=nil, 0x2000) 13:03:08 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB="100000001500050000f1b39e0cba9a4a7a000000"], 0x14}}, 0x0) 13:03:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[]}) [ 289.027522][T29603] overlayfs: workdir and upperdir must reside under the same mount 13:03:08 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x12) 13:03:08 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000080), 0x10) fstat(r0, &(0x7f0000000140)) [ 289.075764][T29714] overlayfs: workdir and upperdir must reside under the same mount 13:03:08 executing program 2: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x222800, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) ptrace$peekuser(0x3, r1, 0xa0f4) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000001c0)=0x8) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000180)={0x0, 0x80000001, 0x100000001, &(0x7f0000000100)=0x7ff}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$SIOCGSTAMPNS(r2, 0x8907, &(0x7f0000000200)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x50009404, &(0x7f00000000c0)) rt_sigprocmask(0x3, &(0x7f0000000000)={0x3077}, &(0x7f0000000080), 0x35f) 13:03:08 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 13:03:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[]}) 13:03:08 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x400006, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:08 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(serpent)\x00'}, 0x58) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) sendto$unix(r2, &(0x7f0000000040)=']', 0x1, 0x0, 0x0, 0x0) recvmsg$kcm(r2, &(0x7f00000005c0)={&(0x7f0000000080)=@sco, 0x20000100, &(0x7f0000000580)=[{&(0x7f0000000480)=""/143, 0xfffffdde}], 0x8}, 0x0) 13:03:08 executing program 2: 13:03:08 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000300)='/dev/input/mouse#\x00', 0x1, 0x10000) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000340)) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = add_key$user(&(0x7f0000000100)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)="761a4fe03a6121cbdb063322b3815eaafb725ef6c2420308d0630396615c115d6e2a356f0da1ec415f6030a6f01b89fcaaf0953ba75c034d8b312eda4c7e7b6f9b4578e8bd063564d8d60bd6bdd788d4385c9e7aab5d9b73a75f5c367f887420613d218ff204ed45923f5092493e10d94598096a99ebacf6c234a8901847dbac14b9b425f9933c63", 0x88, 0x0) keyctl$update(0x2, r2, &(0x7f0000000240)="3e1d128d85c3d115079714af58b33336dda08bf65120997b4755914d9b8cabdb174b7b7aab54219ac249f084df23059edb1395cbb39b15d93cae5ed6aae3dd59a68269921e4621fa4159e77428fcdfac3106c394e8c40a0e9325552343b709e28609a891ab62f0d94bce53c25fc253441e04fd14b704d6a860898f0314e89a32190286c0e6f9c6319f0b1eba5a97be7134", 0x91) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x84800) setsockopt$inet6_buf(r3, 0x29, 0xcc, &(0x7f0000000040)="ae249ef6c35bff5b773d578826293400c26937084378c829feff794d3c0767823725a95ec3d785b52ad726cc392104698a17982de7cad0ae3ceb20f16640c6d062794878a7f643bffbe8a34d994ae6b40fc442a11ce1517f11ece3316adca64d67ac90cd26fd139fcd3b3d670444f8c7de716fd68140d298a30699ea5de98b955daf5936563199969736242533c9d3197afb75b95d9525867659314eece8efc2187ec9e2f03747f617a38a4a223a9eab42", 0xb1) times(&(0x7f0000000380)) 13:03:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[]}) 13:03:08 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x24008}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="2f16ff0f", @ANYRES16=r1, @ANYBLOB="000325bd7000fbdbdf250100000000000000024100000010001369623a627269646765300000"], 0x2c}, 0x1, 0x0, 0x0, 0x4000014}, 0x40) [ 289.539816][T29850] overlayfs: conflicting lowerdir path 13:03:08 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x4b, 0x0, &(0x7f0000000140)) [ 289.588756][T29850] overlayfs: workdir and upperdir must reside under the same mount 13:03:08 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x400007, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:08 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0xddbb2cc1d55469a0) 13:03:08 executing program 4: gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 13:03:08 executing program 0: r0 = epoll_create1(0x0) fcntl$dupfd(r0, 0x0, r0) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='fdinfo/4\x00') readv(r1, &(0x7f0000f46000)=[{&(0x7f0000949000)=""/101, 0x65}], 0x1) 13:03:08 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e22, 0x0, @mcast2, 0x5}}, [0x6, 0x7, 0x20, 0x9, 0x8, 0xffffffffffffffff, 0xfffffffffffffffa, 0x200, 0x4, 0x1, 0x3, 0x1a9, 0x19, 0x2, 0x6]}, &(0x7f0000000000)=0x100) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000080)=@assoc_value={r1, 0xcf}, &(0x7f0000000200)=0x8) 13:03:08 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[]}) 13:03:09 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001240)='/proc/capi/capi20ncci\x00', 0xb1bedbf2d34cbd86, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000001280)={0x0, 0x7}, &(0x7f00000012c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r1, 0x84, 0x19, &(0x7f0000001300)={r2, 0x10e}, 0x8) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) lgetxattr(&(0x7f0000001080)='./file0\x00', &(0x7f0000001100)=@random={'system.', 'selinuxuser)ppp1\x00'}, &(0x7f0000001140)=""/247, 0xf7) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x80, 0x40) read$FUSE(r3, &(0x7f0000000080), 0x1000) connect$vsock_dgram(r3, &(0x7f0000000040)={0x28, 0x0, 0x2710, @reserved}, 0x10) sendto$inet(r3, &(0x7f0000001080), 0x0, 0x80, &(0x7f00000010c0)={0x2, 0x4e22, @empty}, 0x10) 13:03:09 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) [ 289.874644][T29976] overlayfs: conflicting lowerdir path 13:03:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x3ad) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x6d, &(0x7f0000000200)={r1}, &(0x7f0000000240)=0x14) [ 289.967904][T29980] overlayfs: workdir and upperdir must reside under the same mount 13:03:09 executing program 4: gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 13:03:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[]}) 13:03:09 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0xaac2556c77f41ebc, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000100)=0x6) r1 = request_key(&(0x7f0000000040)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f0000000140)='/dev/btrfs-control\x00', 0xfffffffffffffffb) r2 = request_key(&(0x7f0000000340)='blacklist\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)='\x00', 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000300)=[{&(0x7f0000000180)="85d29617dab847dce8ab9fb26555ed11b221d75459e447284d67b65c97e5304d282fb02f9276e56cdf55ba50feea4ac4a632baafbb4ad4507441d21505731e909e2ff9f7c925988e62a7cfa58ba183dcd8a40492518e1841f1f82d287409e43e2048d098dc84949019d346bb2f67efd82d7a2a432c5d6aa87711c596b9fb472bb4555a3f63b79b80bc5e20e52c3e5b68cc6eb218f6d0ab33c8a48fcc9478d60ae5a0ccd797157532962bc017c0b02f5d4cb8a8f1eff84688dc8315ad6e6fd7a6807b90ef94ad6b6af882aef783500308352be800", 0xd4}, {&(0x7f0000000280)="0e75c77cae4fc5fd487fa47572183286c742a8fce2e7323e849611a7c552d7476e1027364385007119cc7542ffdc53ae4d192aab0369044bb8da8639f53d312ccab5227d83971741b3305c48f053d751b1bd9b8fb98fee47a32cd8f90e676d2e9443a13e560b1473d19874a8ab", 0x6d}], 0x2, r2) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f0000000000)={0x1, 0x101}) getdents64(r0, &(0x7f0000000400)=""/69, 0x45) 13:03:09 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x400008, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:09 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x8) 13:03:09 executing program 2: r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000080)='security.evm\x00', &(0x7f0000000100)=@v1={0x2, "c55072fdf781d0550732"}, 0xb, 0x3) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x50009404, &(0x7f00000000c0)={0x0, 0x1}) io_setup(0x838, &(0x7f0000000040)=0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/btrfs-control\x00', 0x4000, 0x0) io_cancel(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x6, 0x1ff, r0, &(0x7f0000000140)="0a2d42afeecf2ad6b79dfbb9559f4fa82192c3be394cb936d3391117076dc08a4ad253573814cbc555a6f1940d12d710b1205853e0c3f2f7f3d75f5be0af22048d887f077ba410c5bbbc1b12ae671c1665140b4416d3587b2ce173b9149c0d2d46ad87a33e284dfbed35ec7e0e442d0419c23250aa858c006dd0cbffbd0287c4372e523455894033f8f4c83e5d724b724e0279e64f752909af2b937a9f23da27e1af8e95af3d02a0e5cd61470a0de9df2a8fe1cd33c49e575e2fe5c1cb2999aa73b2004baf9c2c4d5533694a7fa171e742457688c2e1", 0xd6, 0x420a, 0x0, 0x0, r2}, &(0x7f00000002c0)) 13:03:09 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x4b564d03], [0xc1]}) 13:03:09 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) uname(&(0x7f00000000c0)=""/3) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x800000000000006, 0x2000) recvmsg$kcm(r1, &(0x7f0000000640)={&(0x7f0000000680)=@ax25={{0x3, @null}, [@null, @rose, @null, @rose, @null, @null, @null, @default]}, 0x80, &(0x7f0000001900), 0x0, &(0x7f00000016c0)=""/213, 0xd5}, 0x1) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000000)=0x4, 0x4) ioctl$HDIO_GETGEO(r0, 0x301, &(0x7f0000000100)) recvfrom$ax25(r1, &(0x7f0000000180)=""/16, 0x10, 0x40000000, &(0x7f00000001c0)={{0x3, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7}, [@null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @default, @null]}, 0x48) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000240)={"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"}) 13:03:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00@\x00', &(0x7f0000000040)=ANY=[]}) 13:03:09 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff}) [ 290.344628][T30124] overlayfs: workdir and upperdir must reside under the same mount [ 290.468801][T30164] debugfs: File 'dropped' in directory 'loop0' already present! [ 290.476561][T30164] debugfs: File 'msg' in directory 'loop0' already present! [ 290.489130][T30164] debugfs: File 'trace0' in directory 'loop0' already present! 13:03:09 executing program 2: syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x10000) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f0000000080)={0x100000000}) [ 290.512088][T30128] overlayfs: workdir and upperdir must reside under the same mount 13:03:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00H\x00', &(0x7f0000000040)=ANY=[]}) 13:03:09 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x36d) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x7, 0x101000) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x3ff, 0x9, 0x5, 0x200, 0x0, 0x8, 0x40, 0x4, 0xffffffffffffffff, 0x3, 0x913, 0xa7dc, 0x6, 0x0, 0x880000, 0x100, 0x1, 0xfff, 0x8, 0x0, 0x7, 0x400, 0x1, 0x6, 0x9, 0x7, 0xfff, 0x7, 0x5, 0x0, 0x8, 0x1, 0x8001, 0x1, 0x0, 0xff, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x28, 0x1, 0x1000, 0x9, 0xfffffffffffffffc, 0x80000001, 0x80}, r1, 0x3, r2, 0xa) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000080)) 13:03:09 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x400009, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:09 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0xb3a2ddda2cd3ca96}, 0x10) 13:03:09 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"/1108], 0x454) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f0000000080)) 13:03:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0xc0010002], [0xc1]}) 13:03:09 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00L\x00', &(0x7f0000000040)=ANY=[]}) 13:03:09 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000000)=0xffffffffdfffffe0, 0x8) r1 = open(&(0x7f0000000300)='./file0\x00', 0x40000, 0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000340), 0x4) 13:03:10 executing program 2: ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x50009404, &(0x7f00000000c0)) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000100)=""/137, 0x89, 0x103, 0x0, 0x0) [ 290.851856][T30347] overlayfs: conflicting lowerdir path 13:03:10 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x3ad) [ 290.950440][T30347] overlayfs: workdir and upperdir must reside under the same mount 13:03:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000094], [0xc1]}) 13:03:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00h\x00', &(0x7f0000000040)=ANY=[]}) 13:03:10 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f0000000000)) ioctl$BLKRAGET(r0, 0x1263, &(0x7f0000000080)) 13:03:10 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x400010, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:10 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000400)='ramfs\x00\x9b\x95\x84\x10D\xfb\x9b\x81R#\x10O\xd3\xb4\xe8\xa3\x1f\x00\r\xf6\xd9\xbbt\x95f\x9e\x02\x06\xf946\\{(\xc8\xa7s\xd2>\x81\x88l\x0e\xc5%\x99\x00\x02\x9d\x85\xfc\xa9\\\x99:\xe4\x9c\xf9z>w\xe7\xa9\xa8=\xe9o\x9f\xfbKE\xd7\x9a\x1b\xf8\x86@\x8e\xe6\x9em\x89\xab\x19\xea1\x8e\xa1\xb5\xd7\xc6\xc62\x05\xc7\xe5\xd2m\xeczV\x1d\x84\xcd\xc0\xdf', 0x0, 0x0) chdir(&(0x7f0000000080)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') chroot(&(0x7f0000000000)='./file0/file0\x00') umount2(&(0x7f00000001c0)='./file0/file0\x00', 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x4058534c, 0x0) 13:03:10 executing program 1: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x0, 0x5570, 0x9}}, 0x28) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000240)={0x250cc840, {0x1, 0x6af3, 0x3ff, 0x57, 0x1, 0x401}}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000081a407dd35000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000850009000200000000000000ffffff7f0100008086b224411ab5dcdb7930240ba7708fe9831f564536adb115fd24253781bfd96b4fc012c4a8e0ad21bb5221bb861d36934eb7a419199207f92395f48d3b33e007c4ce721c25573c8cf70e7aa367cfc8ecd2e9e5661ad348b50cacd11d9b0355c34120b694d269fe9ff9d14d0f6d820f7bbda618351271b7f051ab2c9293fb419d"], 0x19d) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x0) 13:03:10 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x31c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x10, &(0x7f0000000080)=[@in={0x2, 0x0, @remote}]}, &(0x7f0000000180)=0x3ad) 13:03:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00l\x00', &(0x7f0000000040)=ANY=[]}) 13:03:10 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) 13:03:10 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 13:03:10 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x4b564d02], [0xc1]}) 13:03:10 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) ptrace$pokeuser(0x6, r1, 0x2, 0x3) ioctl$DRM_IOCTL_WAIT_VBLANK(r0, 0xc018643a, &(0x7f0000000000)={0x0, 0x7, 0xb}) 13:03:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000090], [0xc1]}) [ 291.581910][T30619] overlayfs: filesystem on './file0' not supported as upperdir 13:03:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00t\x00', &(0x7f0000000040)=ANY=[]}) 13:03:10 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) r1 = accept4(r0, &(0x7f0000000000)=@sco, &(0x7f0000000080)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000000c0)={0x2, [0x0, 0x0]}, &(0x7f0000000100)=0xc) 13:03:10 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x400014, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:10 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) write$P9_RMKNOD(r1, &(0x7f0000000080)={0x14}, 0x14) 13:03:10 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(r0, &(0x7f0000001700)=[{0x0, 0x0, &(0x7f0000001240)=[{&(0x7f0000000100)="d636ce7b01769ac307da434aa607fcee3e7705f71db1caced38e3c3b3ef8aee16328976b2f84a51bc85704a7e15a90b8c5d3cd45145ab52299b9149296e690f2241ea4774282c24008ede097d49679b45791b75c60eface5c3", 0x59}, {&(0x7f0000000180)="5e2bb65a5b33cfd38cfa3dc83d1ca06869b82f91c8f291bec2522e69c3a1248545740fa983d849f0b6444a346385f1fc8e4428d47dd448fa88d4fa2d5f5976aa0e67bd0caa0dd8f3ef3783d99d38ceafd51a18e7d23402e3bafff16c170667915c7d9d792cf0966acbf8485faf8e056afe723b438f627ee040c8a3ad6f0b", 0x7e}, {&(0x7f0000000200)="3e922fccd04922e91fdde1a67c714906e3bab6483f735877ec87e943bc7c3bfb1723a9b08c58b5ca7c2baeb622981bc72b94110050b9935f5c3375f5036284aabc137bdb97c2f54464cbe34783ff0f8f3367e6cdfd277d1ece47b06bd2f2753050f1b3936d23b3021a53d5d9f4c281b80571abea94f1d96216ba72ad9bf6ecda6e35a1102c1ca568f57681ea2b86b11439211e667b9001216fadc90690570964146b2a4d5ce594200528f4866260abba57e80a4a6d924cab7ba8274f3e9d6d6494349e76751f2c6257c4237cb1d62ea75426e3ae38ec4b8d794c527e186c9a60579edc74773422c17a3d07902f7c10a149feedfee4788780a9d28d1db4288055767dc41a3ce8d9f41fb2d41b6aee4c18bac5c5e0de10f210137e130f70842a19e3a905d9016b907cb040eff876ea1517a91a7b94a7a54fb17a908c66cbeda00c8b1a85a89e4b0baf4aeab9798eff8b4d09227e26d370a8c4dedf31155c177801ac00f96bae9731e26af6dd2c2535d343b24bc8ec6887f918cf2c72eef9bd4f98315e47e2b810f350fcd9c24cf0e69df3d75c731915243a5633c4490f2766c5a9c21a8547fee6c086c78a75200b373964f4cc31fd1aa2f9eed527c2ae9af4f7914a4a0d28efe4d4cf6ebcb0142fd57203de488b2f2dd2801b0e3c87a4472f35595eae81177e0b7945cb41896e1e81d5528fe967ce0636f775f0e300a9b5b4c285b0f381c548d42ecccbdd35120fb1b7c47d4afb98623671aeee4c122e9215fdb4d5c670d3b8d2002993ec1c4cdd20594431ca7b39dbe525906e1c58f660084792b422466c2a117048f9da401a6b36eb1348ceaae7277f8cd452f859c4f1634cc9df38ee4e70f559c7a1bf85ae87a51d5cbc624839de060f1e6a533a9aa86130ea675cfb54441d5176437de3958615847a2c435e979b4c704f8372cfc5ae7591590652380adb0a689e21160ccd0e36f6f911a9e8826e7c058ecd77f6481380688a55a85f9e20cea41341aa01b7701badfc03f634a21ac846eb8ae0694c0b1bb0e0387f59b84cd23b75929027b22bf8446e7b7d14fca77f2de8f394481ac628e6e9beba37c4b49a56fc9ee46a630a606e1a6dbb3dee589580a974f22c74b07c154bf91bc171b88f98c87212c9c404c0bd51dab974a8c003607a75e66a34b87780b1e30e3ff36efea79fcd75ad887270a99091a2212ae4b291191a87f8f443ec8b61900ce8e6d00173ab872613c4b33d7b068ea518cd5f62056c45b5cef632b1bf0105c13c49a46f82bf5e594cb084be79da04e2f1a2f994cfcc06d0e4af8327210f94b2ebfde3a7fbbb393ceb5ec439c29a7b85780b7a83cf467d532c68e58738a2f90a14971a9f5e7084aba41c7de6c41bd51e95c82619e67440b499fb74bfb3de5b4ad9ecb20d1843c54c2d5932a80f873dab996fdc86296e3adc9f4f19f1a2078900c413e36805f57369b45351008cdbb6efb75266ae892c246093055801f2b9647be42cd32c64ee6625075b4a2380f494844bee4338aba705fab610f43a1a1b005bd0f3b339492bbcff5589b68dca0f9a4add462965739783ce1f633c34f55a83136769ff137f5cf6509908a5fab109ac8ca54b1c42af62f89954a5d9b1f251ccfe79d19f5f8b99596101ac168cf5f0cc81fa182fca00f1dcb74facb9cc502dfd4a4f1bb46addc9a746eb50e56e3a6ade3e99137c6f7b4db39301dcc11103a2d36ad4e900d44b70060302b30e03e3f4054244f39d29bdc9c4be454d7eaed12b77d173dae6779029f2234a1f10f839e021bae27539225d9bb59411dccec40216da75b6747945254b8446a9ae8510ebb3b07283328fe8f6d36d6ab2c8d4ba8ae283168ed8200bc2cbd62618032105fef6b0981dfff51917eecfcf711277fa04b974ed3d97c17eae3d372dade20938a8959815587873e1223dbf04191cb19c7689cad10f91e18062117cee3129c4ab4e6316c102c0ff80bdf34f23c44a85bb46aa256dfd5ddab50b2275c15e59669603cc0b41a639d4ffda017fc396ba24973dd9ff0b746916d66acd668a3fc21d635ce2cf1e7533ce4583f750a03b2e3c71d0cb76c6246a14f01b0274c757b41a3d179148eb37334b05419025d5f93564ce04e8b6418ce96320e91c23106fca0bf788d50e68746d6eb54496fad6d3cd473208ce920db7c61c34dd96d8a0f2d616915e7e9b538131f8498ca39eb0af8f36beb2e4bdc4099ed2ee597b7e118630af98d5600119deb4f2067f027f6f218cc3d5e35a408985cf0d0d5cdd3bfc28a4bb868242640d5c1a1deaede819d67cc7d4ab3f31965c283ce079d695a774586b1c3e772c798123753f6bac86720ff3892bb665b2defaedd5ec636f2319567e0e6d05afdb2f705c4196855c111c2cd2529380b20328dc345a731e2b9600d44d4d47eea7d724dc529ece896eed9b85ed7bf612bde0f5378875474da27a48e9a8e029ee7a7d581b1241adc452139cc96d31650d8fe48fc1bcd693d79f9af2278110c15abed069b159bbb36311c6d373bd28965b2485205d8428d74b7eecdde526b93c829ce60c2c2033369882912ad97db4e7193431e86f3c810543b992a6a164be9219b3b72602b8a6c890b71d39c35e04de80c44c3274f3c42c82307126c98f3185fcb5051423ffbff26aa912714cd8f768bd9c5cb71b81d6604235722ec38502d7bf5ef0a41a8fb725d74c43ff593d2c25a721fb43075a4381023682ac8a13158f29ac154bfbfae2ef04523ef28a69f60971be23c96d071dc044c2933eca0edc8a3c164b188154a73b955ceb9a1af0ffe9be7871a8336e341e319beadbcdaeb1274575d4a1f8f787f50441f19d0c332d9b7099a0eb5679ecf6b8e6c8d5fa23d3c869d99a2636fb91d66dd81e5e89e1a5a8fe33bedcde1a70921d3178501335da8cf33ef4a49691536e5b43ce8c1813632a0c4d13ad31973523519bf758818d98f2ffaa7c1d1fa2878746d4df68a0d6c88c960269f8b2eb1bc7b2adda2da98e69fb6756d2b5a6e2627971192b48fa96d7638ecb4813cce91cf3d00181b26422ee88c63b38af394c7a20ece6d423de52bbc189a41cb5adb862a67e52ca548689ecc4fa08221421bc4d4a0004b6f2cd17d6ea7383ed9fd1cb07f04be18d3b1b2e247c8bb3233026882507ad2ddc6abb91e287ca6eada740be3520122b0360f2860d3e61ebf1f3cba8ae9fcab70df9cf57da688cf854cf8fcde4eb64275a471c1ba1334a4bc91048970f7152c903f4a84cb6547a6c02765b916eb00103d9f3abd629944fd5579a2e7de9f9000bccfd3e8e2ced4ad3342b2c0cd8a010d58bb834f83d51a58aa52fbf7244fa766537c0c5b3f3a581e43a3edaf6365e27e1c707e9b198224b666c1a526e9e7fd878814debd225c520ed773039cfb9adf85df6106eb3d259ff74d77534ff1fb476612b5a30180a08bdf823a7ebba52bed97f8c76879ce4d57441ca1e6d5381f35d9b8c8eb38b686d88473a9707e6e9d07b722b7f82ff9cd3a07898119f90bd71995d53da141296e219e86b3eb2fde8683d205b9ff0be68a1e6ba12c837f8e30c6d552b5c9d1fabb45f5d2ef84e0f29b0d64d64980ce4e60315a2444fc972bce83ea31ae5b1122513f26e14361865585434e508cd0384d7f36bc58484cb02cd040ced9ef4e4abc0e70cc17e8a08639b1a95ebe699acf0b671631e752c22b402dde2017298ec6294adeb4576fca8ab68fce03f3b31e3997b5c7f1c0a71396ccda337453f50e88f59965509424b35c201bbb051c99483c65e180314910ec28c3e14f1c6e90e24d2dddfa61222090c6923714f6dbaade8c80a09b23a16434a73429992b9e72d4c4f287ad7de3a7d09891a33a038c9351c1c87cfc35bfce17969605ae9a6bb251659622a9ee98b64fbbb848d721a10b7fd039b5d1e5197a48b2c1dd44e124339f1ab80f146026fbf819a9e625e37aab2e689e4a6bc827150b59b5a2ab58c4032afe3ce59870242151ad06208caccde3513d68fb1c7159e3abe3d6d0581104fc45ee50ca161196dc5420023df300f4d917af1e921d3fdb44a33b60266d1a2e5b6f187584369b7ed04fa079f66053d498fb48d96dff8b456be93b81dbac6e433e37e9aedf6c981936502a81ccfa71039eb271224a96cada371c81ebc02c67d4f0823afb3a8ec373fbd1a9b2d4eea7d7e1e066124836a4c41e17b50639ad6872e7f60dc6e8cedec78f03a80d2697a59c0d1dee57273e143f98ceca809f3ac2186b50742e2a7bc3b8c36b1321758b7dfb629d8e9b3629f765ebf641b6ffbef9e7540d0070b585641f9835fdeebf754da88cad6d581f4331121dd13028dfcfdeac65d3d4ef66deef71979369e6cd59de00cc3314cb66fd21f14e1a6d841fc661da6f348aab8a89932545137a6a5aa26ddb03f82c787f25c73e1a5be250d91355c6ceab025a6497f01f6035a5d66d9b4363bf29bd78a6de6ae06b677b7efde0a1f22faa1daa0884d0ceb6e24eb0d52a0ceb23668568d59bb4e065e68cfad29bc45051e96e7fa306aeb37acd5643851edad17fcf8d92117c6616462721c780f4f5d166b819b0e0fc9e148ea8de34d44d911b91219db38eda8f75db25d072409afbaaaa960387bc87c238f2e4fed64b94575b5097b665ae6bb4e494ec2ef47091fa1eddafcb6c95974c17f6a29888cbf69a94b5e09db11bd926d8543f7a2777db03b08d51afe5058d36d8e2b662e352d34c720e37ac41ebac8ead893e396f9557c5806221d947754585e840f9c2b66b41776d5a3f6e308d6f931d7e07d547bf3bd6917a1eb02b9cdf5cb33623f5c876cc9df0e527494cc63cbf152ab9fb4871b65f569ead56a31127028c32186d9bfbaaae95536d1308b679dec47a9ac91f18f63f092111c74f7ef722913485f8caedd3809d67f0f7f09cd2e1f356a62d8cb0af4d2640883501c8aceb4665e6912837e4d99eccaf8177a06c31f9fdca3ab9e14290df537ad06d1026f3b5d605a79d6cb1ae9a5d1bc84e2e8752095574c0bef2a37947dd8b92f0e461efb0c63e9f03d31879ec0f43c203a33a6b6a3fabb8d2363469729ab3a7767feaa0b5ebfc4c90bf2d7710de7ba8c71319cccf97bd36f22e24ebb7c28255c6cdbf5552089c6fbefb0353282df0cd0f616cbb61de82b0c2655528cb7a6ab023c5f18f3b537be684bcfce4533ed776cf7ecde17a84664cc5885578f3d4ca16b02ba5ae56a884a0b8a25fc71b99b368bd90332840a6af9c8d626d750dc9de189d8249af23d7f50513c176c132f15d8a467546353ced16e6c1de33aa5f387a5b6c888cf24238fc7c9b180412fc4ffe00dbd0339d56bdd1559f08d9d6f948da5999fc813af8ec3c8b0fe3fe3db435e8d3a608d50769ac52f07a292101f073cb8b6b54dd3accc6abb855dddd84e9076b2da46d5a8825e7e7f62008d8e9d0941904a2f0314efa130de09d1fd75ffaa4287736510f608bdbbc7e8d3bbac811b6d1f3554ee552bfa49693729675804c4f88e7f4328293ea3e3780d040e52230d7e96d52a6bd84a214771b7cc90ff9deac081bcc0cfcc9e36acd935e6fc0bd71a4eecc8c5ca596d420f749af98d4d7772b711c025caa532784e1f4360067e0394d62fade03161b693a7965f7ded9cadf4d381ea60d25672d2bbd3cb45f98184b51b1891725d1f96b50d2ef6d9e6c349f8671c7119947921d0c2444fe51675aa1a9a6911202e2cfdf6f2b7d5139a77f3a665bd30013db45a583a55b93f612f76ed60d3852ad2b663bef951dee5db9be79f16bcc284e46c08172e42878f52af3c5613c6ce65148a0ee1", 0x1000}, {&(0x7f0000000080)="e04d26", 0x3}, {&(0x7f0000001200)='X', 0x1}], 0x5, 0x0, 0x0, 0xc000}, {0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000012c0)="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", 0xfb}], 0x1, &(0x7f0000001400)=[@op={0x18}, @assoc={0x18, 0x117, 0x4, 0xd1}, @op={0x18}, @assoc={0x18, 0x117, 0x4, 0x20}, @iv={0x100, 0x117, 0x2, 0xe6, "c54be6199820d730c30eab8e0c8ea84ef176da563fccb3353aae8b4c8e586e726fe382b422efd343ce29b653a894ced41ec0c2ac24e6a6919113d26cd0989ef9b17398e525e349a0d43f8986dd0a2f4b508e929c524da8fdd44c0dc22e1757a5c55ac3aa354c4e1d46b9467f7876d0909cf609c61076804db56d6415d45c968d1618fcb883c60b1ca6ec59035ef64edbd7bfb7d851b4d314c9a8e8b8a65af8e9d2a6f132ca5e2ed4f3e51d0575fe0674760946defe50377a9899e02711715069ab0e02adad75d28b52312a7aa4577798f923db9264223f55866879f68bb6e619c475d952dc2e"}, @assoc={0x18, 0x117, 0x4, 0x1}, @iv={0x60, 0x117, 0x2, 0x48, "41b2fe9be1e7a2cc361b08716220c63d9c3588c0fbecce4e333beb76c3ae9c4bbc7c9c290adf6b7705b3cbabadc14ace128cbbfa8e0999c65c05e577059e125dbd83fd7dc44b4425"}, @op={0x18}, @iv={0x100, 0x117, 0x2, 0xe6, "c1f7d38c0788a104a19bfc4a29b6290e744505ddb01ac296384427926078df29f95a3b11d9f1abb008f9aa288beacbdeb8c9fbfc507deb8bdaca59d1901e4980a1b2173be69ba4929475dfb78a4ebd1601674176f72e68efc98abeaa2eddbcf0b0722aa8cd57e8311b5d934880cc24f613099862307cd852c40df4c8beac9ac2b25df6a80592bb0607f4eded7ffdcfbbc92fb7b893d2cd10e7cb07a35802b5d5c80dc201f56ceb9e6fcb86fe13c9aae25a93a920f420aaa3bf93acc0ed34e85c94643403d1a22fc822065b02ea0f5d9339647a9aa479601fe0b14a0289b3d72549a2215f3645"}], 0x2f0, 0x4000004}], 0x2, 0x2000c080) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009404, &(0x7f00000000c0)) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) 13:03:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x00\x00z\x00', &(0x7f0000000040)=ANY=[]}) 13:03:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0xc0010001], [0xc1]}) 13:03:11 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000092], [0xc1]}) 13:03:11 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x491d5a51c7c2c1cf, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) write$binfmt_aout(r0, &(0x7f0000000140)={{0x108, 0x80000000, 0x8000, 0x260, 0x389, 0x5, 0x1c8, 0xfffffffffffffffa}, "2fc08ead51a6a875e8dedc6f9e6f9bdf974aa72468598401492df74eda0c88a4e0bebf404518ddf0da0e0b6096196f2f9e497c3b98625b77ddacfdca0a89edd6a5be06f4b1ff6d01aee915fe3d2b1702aac662bc230914a1dc3bcb6197f4430e729aa39638592d0bae1472ef7c4b01d2e3d120f27102b13161fbcd52b0415e71b14deb9b", [[], []]}, 0x2a4) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x3000004, 0x20010, r0, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, r0) fspick(r0, &(0x7f0000000040)='./file0\x00', 0x1) 13:03:11 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x5) pread64(r0, &(0x7f0000000380)=""/229, 0xe5, 0xe) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x434500, 0x0) recvmsg$kcm(r2, &(0x7f0000000340)={&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @dev}, 0x80, &(0x7f0000000200)=[{&(0x7f00000000c0)=""/84, 0x54}, {&(0x7f0000000140)=""/173, 0xad}], 0x2, &(0x7f0000000240)=""/207, 0xcf}, 0x40000101) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000480), &(0x7f00000004c0)=0x4) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) accept(r1, 0x0, &(0x7f0000000540)) [ 292.098694][T30772] overlayfs: workdir and upperdir must reside under the same mount 13:03:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 292.162872][T30772] overlayfs: workdir and upperdir must reside under the same mount 13:03:11 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000100)='/dev/vcsa#\x00', 0x3, 0x200000) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000200)=ANY=[@ANYBLOB="06000000000000f9ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b534c75cb6f47ce16e7221aef7f4fa478cc01a518b"]) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r0}) write$P9_RSTATFS(r0, &(0x7f0000000180)={0x43, 0x9, 0x2, {0x0, 0x22c3, 0x7fff, 0x9, 0x81, 0xfffffffffffffffe, 0x3, 0xfffffffffffffff8}}, 0x43) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009404, &(0x7f00000000c0)) 13:03:11 executing program 0: r0 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000200)='\x00', 0x1, 0xfffffffffffffffe) io_setup(0x30, &(0x7f0000000180)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") keyctl$update(0x2, r0, &(0x7f0000000240)="db40951195b6532950", 0x9) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r0, r2, r0}, &(0x7f00000000c0)=""/83, 0xfffffffffffffe4f, 0x0) 13:03:11 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$VIDIOC_S_STD(0xffffffffffffffff, 0x40085618, 0x0) timer_create(0x0, 0x0, 0x0) 13:03:11 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x400025, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:11 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0xfffffffffffffef4) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f00000000c0)=0x1) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) 13:03:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:03:11 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x7a, 0x464}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000240)={'batadv0\x00', 0x200}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r0, 0xc1105518, &(0x7f0000000100)={{0x2, 0x6, 0x9, 0x800, '\x00', 0x7}, 0x1, 0x50, 0x9, 0x0, 0x2, 0x3, 'syz1\x00', &(0x7f0000000080)=['/dev/btrfs-control\x00', '\x00'], 0x14, [], [0x9, 0x6, 0xfff, 0xb1f]}) [ 292.516490][T31010] QAT: Invalid ioctl 13:03:11 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={[], 0x0, 0x400, 0x3ff, 0x0, 0x26}) [ 292.542023][T31006] overlayfs: conflicting lowerdir path 13:03:11 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 292.660976][T31006] overlayfs: workdir and upperdir must reside under the same mount 13:03:11 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6, 0x200000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000040)={0x7, 0x80000001, 0x1, 'queue0\x00', 0x8}) syz_open_dev$vivid(&(0x7f0000000100)='/dev/video#\x00', 0x2, 0x2) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:03:11 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x40002) read$eventfd(r0, &(0x7f0000000080), 0x8) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000100), &(0x7f0000000140)=0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000380)={0xffffffffffffffff}, 0x13f, 0x3}}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000440)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1c, &(0x7f0000000480)={@empty, r3}, 0x14) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r1, &(0x7f0000000400)={0x5, 0x10, 0xfa00, {&(0x7f0000000180), r2}}, 0x18) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009404, &(0x7f00000000c0)) 13:03:11 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40003c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:11 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 13:03:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) [ 293.119904][T31234] overlayfs: filesystem on './file0' not supported as upperdir 13:03:12 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000096], [0xc1]}) 13:03:12 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x1, 0x0) write$vnet(r0, &(0x7f0000000340)={0x1, {&(0x7f0000000280)=""/1, 0x1, &(0x7f00000002c0)=""/89, 0x3}}, 0x68) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009404, &(0x7f00000000c0)) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000000), &(0x7f0000000080)=0x4) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f00000003c0)=[@timestamp, @window={0x3, 0x7fffffff, 0x7a}, @window={0x3, 0x1, 0x80000000}, @timestamp, @mss={0x2, 0x401}, @sack_perm], 0x200000000000017c) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f0000000140)={0x2, &(0x7f0000000100)=[{0x0}, {}]}) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000400)={0x7, 0x1, 0x3, 0x40, 0x100}, 0xc) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000200)={r2, &(0x7f0000000180)=""/117}) 13:03:12 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x440000, 0x0) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f0000000040)=0x32) ioctl$FICLONE(r0, 0x40049409, r0) r1 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, 0x0, 0x0) 13:03:12 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x7ffffffff000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:03:12 executing program 2: ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x50009404, &(0x7f00000000c0)) r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@ipx, &(0x7f0000000080)=0x80, 0x80800) r1 = accept4$tipc(r0, &(0x7f0000000100)=@id, &(0x7f0000000140)=0x10, 0x80000) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f00000001c0)={0x10000000}) 13:03:12 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:gpg_exec_t:s0\x00', 0x20, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x10) 13:03:12 executing program 4: r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/247, 0xffffff80}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xadbf80a3}], 0x23a, 0x0) 13:03:12 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='%verlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:12 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:03:13 executing program 0: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 13:03:13 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x90002, 0x0) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000000)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f0000000100)={0xfffffffffffffffd}) 13:03:13 executing program 1: r0 = socket$vsock_stream(0x28, 0x1, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x8000, 0x0) ioctl$TIOCSIG(r1, 0x40045436, 0x3c) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, 0x0, 0x0) 13:03:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:03:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x3, 0x0, &(0x7f0000000140)) 13:03:13 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=',verlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:13 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmsg$can_bcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) 13:03:13 executing program 2: arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x8000) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)={0x8, 0x10004}) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000000)=@assoc_id=0x0, &(0x7f0000000080)=0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x5, 0x1, 0xb1c3, 0x6, r1}, &(0x7f0000000140)=0x10) 13:03:13 executing program 1: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x1, 0x1f}, 0x10) sendmsg$can_bcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x0) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, 0x0) 13:03:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:03:13 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='/verlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000091], [0xc1]}) 13:03:13 executing program 2: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$VIDIOC_DQEVENT(r0, 0x80885659, &(0x7f0000000100)={0x0, @src_change}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$TIOCNXCL(r0, 0x540d) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009404, &(0x7f00000000c0)) 13:03:13 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:03:13 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget(0x3, 0x400) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0xa1d) syz_open_procfs(0x0, &(0x7f0000000100)='smaps_rollup\x00') ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 13:03:13 executing program 2: sysinfo(&(0x7f0000000000)=""/25) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x121005, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f0000000100)={0x4, 0x1}) 13:03:13 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='\\verlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:03:14 executing program 4: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/247, 0xffffff80}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xadbf80a3}], 0x23a, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, 0x0) 13:03:14 executing program 1: syz_emit_ethernet(0x5a, &(0x7f0000000580)=ANY=[@ANYBLOB="00000000000017e15c72746d81000000000d0000000000000000e706d9a14d4b484bc81ea136f784648a9b76eb10116672b56d7c75a31fa68623c18ecf1bcddba180efcb80104ea35f01a2eeaf96bcf447382d4e8f1b900a19c2"], 0x0) 13:03:14 executing program 2: getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@random={'btrfs.', '\x00'}, &(0x7f0000000100)=""/67, 0x43) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000180)=0x4, 0x4) 13:03:14 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='o\\erlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:14 executing program 0: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x8000800, 0x3c1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x10010000000035) wait4(r1, 0x0, 0x2, 0x0) 13:03:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:03:14 executing program 2: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x8000, 0x0) getsockname$netrom(r0, &(0x7f0000000100)={{0x3, @null}, [@rose, @remote, @bcast, @rose, @rose, @rose, @rose]}, &(0x7f0000000080)=0x48) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x1) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/btrfs-control\x00', 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f00000002c0)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009404, &(0x7f0000000300)={0x0, 0xfffffffffffffffe}) lgetxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@known='system.posix_acl_default\x00', &(0x7f0000000200)=""/132, 0x84) fstatfs(r0, &(0x7f0000000380)=""/72) fcntl$setflags(r0, 0x2, 0x1) 13:03:14 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0xc001001f], [0xc1]}) 13:03:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:03:14 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ov%rlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:14 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x30fbd24b147f5364, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x1d, 0x20, 0x0, 0x2, 0x1, 0x7, 0x100000000, 0x8, 0x0}, &(0x7f0000000180)=0x20) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000300)={r1}, 0x8) mq_timedsend(r0, &(0x7f0000000240)="a4703467fafb57b7cdd95ad6e4bf1b9796429e007cf15674fc94775dbfe0e4d5384939d6a1a08ac7baa7e3351d3b317498a4e5cd45e9b05bd16fbacb795c4262b588d00ad1be0a710bbed3f034c176f8de168cb8b3cd1c2c959e323a25b6a564ffb300bd6467db4deb35512dfa0ee2cd8a3e0ef0ec206ebbfc8fb769cb4cf539ac3cf67cd3dc", 0x86, 0x8, &(0x7f0000000080)={0x0, 0x1c9c380}) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r2, 0x50009404, &(0x7f00000000c0)) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f00000001c0)=0x5, &(0x7f0000000200)=0x1) connect$llc(r2, &(0x7f0000000100)={0x1a, 0xf03a4b926d4ba411, 0x9, 0x7, 0x3, 0x5}, 0x10) 13:03:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0xc0010005], [0xc1]}) 13:03:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) getpgid(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) shutdown(r1, 0x1) 13:03:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:03:15 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ov,rlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:15 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x12, 0x0, &(0x7f0000000140)) 13:03:15 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f0000000000)={0x20000000000}) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f0000000080)=0x9, &(0x7f00000000c0)=0x2) [ 295.902136][T31938] kvm [31937]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc0010005 data 0x0 13:03:15 executing program 2: r0 = socket$inet6(0xa, 0x8d53a9febd0023d5, 0x80000001) ioctl$void(r0, 0x5450) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009404, &(0x7f00000000c0)) 13:03:15 executing program 1: openat$ashmem(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ashmem\x00', 0x0, 0x0) prctl$PR_GET_UNALIGN(0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$uinput_user_dev(r1, &(0x7f00000006c0)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9de, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1], [0x101, 0x40, 0x0, 0x6f, 0x0, 0x0, 0x3ff, 0x1000, 0x0, 0x6, 0x0, 0xffff, 0x0, 0x100, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x200, 0xff, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x5], [0x0, 0x0, 0x10000, 0x0, 0x8, 0x0, 0xffffffff, 0x8, 0x601, 0x101, 0x3, 0x0, 0x9d9, 0x0, 0x2, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x3, 0x0, 0x100000001, 0x0, 0x8001, 0x367, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x6, 0x8, 0x8001, 0x5, 0xce9, 0x0, 0x10000, 0x0, 0x2, 0x2a], [0x81, 0x0, 0x0, 0x0, 0x1e3, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xa067, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x5]}, 0x45c) bind$unix(0xffffffffffffffff, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e24}, 0x6e) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0xd0, r2, 0x400, 0x70bd29, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xafb7d9ba0714b836}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x100}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x7, 0x1}}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_PORT={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x45}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x80000000}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x81}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x67f}]}, 0xd0}}, 0x4) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8, 0x20}) 13:03:15 executing program 0: gettid() perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$cec(0x0, 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 13:03:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00', &(0x7f0000000040)=ANY=[]}) 13:03:15 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ov\\rlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:15 executing program 4: gettid() perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget(0x3, 0x400) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/24) r1 = syz_open_dev$cec(0x0, 0x0, 0x2) syz_open_dev$usbmon(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) shmget(0x0, 0x4000, 0xa04, &(0x7f0000ffc000/0x4000)=nil) r2 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='smaps_rollup\x00') ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) 13:03:15 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x0, 0x1, 0x0, [], [{0x6, 0x1, 0xfffffffffffffffb, 0x80, 0x81, 0xcb}, {0xfffffffffffff107, 0x0, 0x5, 0x4d, 0x101, 0x100000000}], [[]]}) ioctl$KVM_CREATE_DEVICE(r0, 0xc00caee0, &(0x7f0000000000)={0xb5e0aed144459a8b, r0, 0x1}) 13:03:15 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ove,lay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x02\x00', &(0x7f0000000040)=ANY=[]}) 13:03:15 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_int(r0, 0x29, 0x13, 0x0, &(0x7f0000000140)) 13:03:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) process_vm_writev(0x0, &(0x7f0000000000)=[{&(0x7f0000000180)=""/247, 0xffffff80}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xadbf80a3}], 0x23a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 13:03:15 executing program 2: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x41, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000000)='rose0\x00', 0x401, 0x4, 0x400}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r1, 0x50009404, &(0x7f00000000c0)) 13:03:15 executing program 4: gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgget(0x3, 0x0) syz_open_dev$cec(0x0, 0x0, 0x2) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) 13:03:15 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='smaps\x00') sendfile(r0, r1, &(0x7f0000000000)=0x100000, 0x8004) 13:03:15 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x03\x00', &(0x7f0000000040)=ANY=[]}) 13:03:15 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ove/lay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:15 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$KVM_ARM_SET_DEVICE_ADDR(r0, 0x4010aeab, &(0x7f0000000000)={0x80000000, 0x104004}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) fcntl$getownex(r0, 0x10, &(0x7f0000000580)={0x0, 0x0}) getresuid(&(0x7f00000005c0), &(0x7f0000000600), &(0x7f0000000640)=0x0) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000780)={&(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000500)=[{&(0x7f0000000180)="86de1dd938206c872f59e1be313c1a86415354b6b6a81f4f64d02ec2eb6d088691d72f8553c1bf01f6ccd54f2029a5d2ce36e11d61e72c9fdbc28a9ff5aaec73af3362986eb90dc12aff51be9bc9d20e4ed27e55f338a9bd41549f41f1828b44f3d313290f32ec570a0941ae49930bfa558ebeb3200636701fc64c502344fbc7ec6038cf786b22aae908644265b7436f4494612cbf4a149ddb341157f410c9abd405c9cf3615552cb18b86ff1d1e2fc81e0b649e63ff9f25da2cbd583383bd5477a5db", 0xc3}, {&(0x7f0000000280)="50bcc46eea775bbb75e435493afa150dc1fe987843afe621ce530e447beab9a993a8a0bcaef302e91bab1cf5b2368563691ee2835701408bd7ead2b6bda38a234b8dd5eccf17c7b89bfdd6c376c6498394fcf07e623452eb6f8362eb14b91883727e35ea0c48252ee1481e812c402829dd4ae74923c96ab72f1325675588fb0c56503c6dee38c794e6eb8d6158fc6085b400a8edd9d50b49b04f", 0x9a}, {&(0x7f0000000340)="8fdefffe796f12e9984de39b05b49842ffb0c7efe28bb99fa399747e0dbe37be31471bfc2bb5d40b9b6b273964b1288b8f27b1c6172ae99abb0ab53224b9d811a2f766ffb0894e09684d99d16299466f96bcda1fa109f8f9cd1fe122908cc3499d4a951075850ae146576cb8b4", 0x6d}, {&(0x7f0000000080)="0db6058ddc4c2a1112e852954ff61516704a0f88e0698bf08f4548ea7e379df40d8074f4a0de5c", 0x27}, {&(0x7f00000003c0)="ff4535ab9ad6cab5c66e66a63bb0d12c761c199095d3e4828b0082a95da24ecd1d3c08c075a701802f7b62c8f361cbcb43ff999e06aa95ac1875759c6bc7c67c7fdd9d015fb050c3c634a77490f3bc6a777f67e4c6f21fef14b52157d51aeb1238586dc9ab3b901dcc0ce4", 0x6b}, {&(0x7f0000000440)="0b1125cff2a3d2fa2437fe4e62499dd4d50656692ddce41e95c170c8e5af6108c0cd3f464c44a055201873bbd7ee40730045589be99714c0fa493472f0167ba83684ddc380f7382d04dba12340042990fbead9dec536ad6f7fc8a93129aa4ba742602bdc781f4a7669a381062f3cd15a058b5334a514f9c99f79d9af77e5b16d76ca2bc1d9e45842d5bb5ead63147be3e59f0ef3be84006d2a23d6a0a62c655cb9459bc764400f3939ca55ec", 0xac}], 0x6, &(0x7f0000000740)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}], 0x38, 0x4044}, 0x20000000) 13:03:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000040)={0x7b, 0x5, [0x40000101], [0xc1]}) 13:03:16 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='ove\\lay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(serpent)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56", 0x2) 13:03:16 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) msgctl$MSG_INFO(0x0, 0xc, 0x0) shmget(0x0, 0x4000, 0xa04, &(0x7f0000ffc000/0x4000)=nil) syz_open_dev$loop(0x0, 0x0, 0x0) 13:03:16 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000000)={0x0, 0x80000, r0}) ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000100)={0xd, 0xcb, 0x100, 0xb, 0x2, 0x81}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f0000000080)={r1, 0x80000, r0}) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:03:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x04\x00', &(0x7f0000000040)=ANY=[]}) 13:03:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") syz_mount_image$vfat(&(0x7f0000000040)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={[], [{@seclabel='seclabel'}]}) 13:03:16 executing program 1: 13:03:16 executing program 4: 13:03:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x05\x00', &(0x7f0000000040)=ANY=[]}) 13:03:16 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='over#ay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) 13:03:16 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) 13:03:16 executing program 4: perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r0, &(0x7f0000000040)={0x1a, 0x0, 0x1f}, 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 13:03:16 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xf7d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) socket$inet_udplite(0x2, 0x2, 0x88) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000040)=""/46) open(0x0, 0x0, 0x100) socket(0xa, 0x1, 0x0) fallocate(r0, 0x1, 0x0, 0x369e5d84) openat$cgroup_ro(r0, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) [ 297.382495][T32373] FAT-fs (loop0): Unrecognized mount option "seclabel" or missing value 13:03:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\x06\x00', &(0x7f0000000040)=ANY=[]}) 13:03:16 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000240)={0x7fff, 0xbae}) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x100000001) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000080)=""/96) 13:03:16 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x2) io_setup(0x9, &(0x7f0000000000)=0x0) io_submit(r1, 0x1ffffffffffffe50, &(0x7f0000000540)) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x50009404, &(0x7f00000000c0)) [ 297.524163][T32396] FAT-fs (loop0): Unrecognized mount option "seclabel" or missing value 13:03:16 executing program 3: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$9p_virtio(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r0, 0x0, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@isdn, 0x0, 0x80800) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) r2 = getuid() stat(0x0, &(0x7f0000000880)) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {0x1, 0x3}, [{0x2, 0x0, r2}, {0x2, 0x2}], {0x4, 0x7}, [{}, {0x8, 0x2}, {0x8, 0x7}, {}, {0x8, 0x1}], {0x10, 0x6}, {0x20, 0x7}}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='over%ay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) [ 297.645178][T32407] ================================================================== [ 297.653292][T32407] BUG: KASAN: null-ptr-deref in rxrpc_unuse_local+0x23/0x70 [ 297.660590][T32407] Write of size 4 at addr 0000000000000010 by task syz-executor.2/32407 [ 297.668913][T32407] [ 297.671258][T32407] CPU: 0 PID: 32407 Comm: syz-executor.2 Not tainted 5.3.0-rc3-next-20190809 #63 [ 297.680369][T32407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.690430][T32407] Call Trace: 13:03:16 executing program 0: r0 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r1 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r0, 0x4d) sendmmsg$inet(r1, &(0x7f0000002f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) connect$inet(r1, &(0x7f0000e5c000)={0x2, 0x4e20, @loopback=0x7f000002}, 0x10) 13:03:16 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f3, &(0x7f0000000300)={'gre0\x00\x00\x00\b\x00\x00\x00\x00\a\x00', &(0x7f0000000040)=ANY=[]}) [ 297.693739][T32407] dump_stack+0x172/0x1f0 [ 297.698090][T32407] ? rxrpc_unuse_local+0x23/0x70 [ 297.703031][T32407] ? rxrpc_unuse_local+0x23/0x70 [ 297.707980][T32407] __kasan_report.cold+0x5/0x36 [ 297.712846][T32407] ? _raw_read_unlock_irqrestore+0xd1/0xe0 [ 297.718669][T32407] ? rxrpc_unuse_local+0x23/0x70 [ 297.723629][T32407] kasan_report+0x12/0x17 [ 297.727972][T32407] check_memory_region+0x134/0x1a0 [ 297.733092][T32407] __kasan_check_write+0x14/0x20 [ 297.738039][T32407] rxrpc_unuse_local+0x23/0x70 [ 297.742813][T32407] rxrpc_release+0x47d/0x840 [ 297.747402][T32407] __sock_release+0xce/0x280 [ 297.751989][T32407] sock_close+0x1e/0x30 [ 297.756148][T32407] __fput+0x2ff/0x890 [ 297.760120][T32407] ? __sock_release+0x280/0x280 [ 297.764958][T32407] ____fput+0x16/0x20 [ 297.768970][T32407] task_work_run+0x145/0x1c0 [ 297.773555][T32407] exit_to_usermode_loop+0x316/0x380 [ 297.778835][T32407] do_syscall_64+0x65f/0x760 [ 297.783430][T32407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 297.789356][T32407] RIP: 0033:0x413511 [ 297.793266][T32407] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 297.812864][T32407] RSP: 002b:00007ffce33cbbc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 297.821262][T32407] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413511 [ 297.829229][T32407] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 297.837186][T32407] RBP: 0000000000000001 R08: 0000000020577aae R09: 0000000020577ab2 13:03:17 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x0, 0x0) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000280), 0x0) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000240)={0x7fff, 0xbae}) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x100000001) r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$KVM_GET_EMULATED_CPUID(0xffffffffffffffff, 0xc008ae09, &(0x7f0000000080)=""/96) [ 297.845147][T32407] R10: 00007ffce33cbca0 R11: 0000000000000293 R12: 000000000075bf20 [ 297.853108][T32407] R13: 0000000000048a92 R14: 00000000007602c0 R15: ffffffffffffffff [ 297.861075][T32407] ================================================================== [ 297.874868][T32407] Kernel panic - not syncing: panic_on_warn set ... [ 297.881482][T32407] CPU: 0 PID: 32407 Comm: syz-executor.2 Tainted: G B 5.3.0-rc3-next-20190809 #63 [ 297.891958][T32407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 297.902019][T32407] Call Trace: [ 297.905300][T32407] dump_stack+0x172/0x1f0 [ 297.909620][T32407] panic+0x2dc/0x755 [ 297.913510][T32407] ? add_taint.cold+0x16/0x16 [ 297.918178][T32407] ? rxrpc_unuse_local+0x23/0x70 [ 297.923125][T32407] ? preempt_schedule+0x4b/0x60 [ 297.927979][T32407] ? ___preempt_schedule+0x16/0x20 [ 297.933100][T32407] ? trace_hardirqs_on+0x5e/0x240 [ 297.938127][T32407] ? rxrpc_unuse_local+0x23/0x70 [ 297.943075][T32407] end_report+0x47/0x4f [ 297.947219][T32407] ? rxrpc_unuse_local+0x23/0x70 [ 297.952146][T32407] __kasan_report.cold+0xe/0x36 [ 297.956983][T32407] ? _raw_read_unlock_irqrestore+0xd1/0xe0 [ 297.962812][T32407] ? rxrpc_unuse_local+0x23/0x70 [ 297.967752][T32407] kasan_report+0x12/0x17 [ 297.972074][T32407] check_memory_region+0x134/0x1a0 [ 297.977193][T32407] __kasan_check_write+0x14/0x20 [ 297.982119][T32407] rxrpc_unuse_local+0x23/0x70 [ 297.986883][T32407] rxrpc_release+0x47d/0x840 [ 297.991497][T32407] __sock_release+0xce/0x280 [ 297.996081][T32407] sock_close+0x1e/0x30 [ 298.000231][T32407] __fput+0x2ff/0x890 [ 298.004304][T32407] ? __sock_release+0x280/0x280 [ 298.009158][T32407] ____fput+0x16/0x20 [ 298.013144][T32407] task_work_run+0x145/0x1c0 [ 298.017742][T32407] exit_to_usermode_loop+0x316/0x380 [ 298.023017][T32407] do_syscall_64+0x65f/0x760 [ 298.027594][T32407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 298.033474][T32407] RIP: 0033:0x413511 [ 298.037366][T32407] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 04 1b 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 298.057118][T32407] RSP: 002b:00007ffce33cbbc0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 298.065516][T32407] RAX: 0000000000000000 RBX: 0000000000000005 RCX: 0000000000413511 [ 298.073477][T32407] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 298.081448][T32407] RBP: 0000000000000001 R08: 0000000020577aae R09: 0000000020577ab2 [ 298.089435][T32407] R10: 00007ffce33cbca0 R11: 0000000000000293 R12: 000000000075bf20 [ 298.097404][T32407] R13: 0000000000048a92 R14: 00000000007602c0 R15: ffffffffffffffff [ 298.106388][T32407] Kernel Offset: disabled [ 298.117597][T32407] Rebooting in 86400 seconds..