LOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:24 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:24 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4a0082, 0x8) setsockopt$X25_QBITINCL(r1, 0x106, 0x1, &(0x7f0000000040), 0x4) r2 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r8) mount$9p_fd(0x0, &(0x7f0000000080)='\x00', &(0x7f00000000c0)='9p\x00', 0x2000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r4}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, r7}}, {@posixacl='posixacl'}, {@msize={'msize', 0x3d, 0x3}}, {@dfltgid={'dfltgid', 0x3d, r8}}, {@cachetag={'cachetag', 0x3d, ']md5sum^}trustedproc'}}], [{@context={'context', 0x3d, 'unconfined_u'}}, {@smackfsfloor={'smackfsfloor'}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x61, 0x6d, 0x36, 0x61, 0x31, 0x35, 0x64], 0x2d, [0x60, 0x38, 0x31, 0x34], 0x2d, [0x39, 0x39, 0x32, 0x63], 0x2d, [0x66, 0x64, 0x35, 0x66], 0x2d, [0x34, 0x36, 0x66, 0x64, 0x0, 0x64, 0x32, 0x34]}}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@obj_type={'obj_type', 0x3d, 'uservmnet1'}}]}}) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r9 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r12, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x0, {0xa, 0x0, 0x0, r14}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0xf}]}, 0x28}}, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r11, 0x8918, &(0x7f00000001c0)={@ipv4={[], [], @loopback}, 0x12, r14}) 00:18:24 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:24 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x40, 0x13, 0xa, 0x5, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x1}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x840) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x8, 0x0, &(0x7f0000000240)) [ 349.100738][ T9167] overlayfs: conflicting lowerdir path [ 349.171187][ T9172] overlayfs: conflicting lowerdir path 00:18:24 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) dup2(r1, r2) r3 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000080)=ANY=[@ANYRES32=r4, @ANYBLOB="000725397238000004"], 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000180)={r4, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x4}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0xffff, 0x101, 0x1, 0x9, 0x0, 0x6, 0x7fffffff, 0x6, r4}, &(0x7f0000000040)=0x20) r5 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r5, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:24 executing program 5: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:24 executing program 3: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:25 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1400000000001f89"], 0x1}}, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_CAPBSET_READ(0x17, 0x11) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="14000000010a"], 0x6}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xffd7) r6 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$VIDIOC_G_EXT_CTRLS(r6, 0xc0205647, &(0x7f00000001c0)={0x9d0000, 0x7, 0x400, 0xffffffffffffffff, 0x0, &(0x7f0000000180)={0x990969, 0x5, [], @string=&(0x7f0000000100)=0x40}}) splice(r3, 0x0, r5, 0x0, 0x80000000, 0x0) 00:18:25 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0xffffffffffff9f4d, 0x200) r1 = perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x20, 0x0, 0x0, 0x0, 0x77, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_config_ext={0x6f, 0xffffffffffffffff}, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x0) fcntl$setstatus(r1, 0x4, 0x3800) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm-monitor\x00', 0x300, 0x0) setsockopt$RDS_CONG_MONITOR(r3, 0x114, 0x6, &(0x7f0000000400), 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x1, 0x2) ioctl$SCSI_IOCTL_DOORUNLOCK(r5, 0x5381) r6 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x40, 0x0) bind$inet(r6, &(0x7f0000000440)={0x2, 0x4e1b, @multicast2}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r7 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r8 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r8, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/mISDNtimer\x00', 0x44000, 0x0) ioctl$LOOP_CHANGE_FD(r7, 0x4c00, r8) sendfile(r4, r7, 0x0, 0x102000003) setsockopt$inet_int(r4, 0x0, 0x32, &(0x7f0000000100)=0x72, 0x4) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SNDRV_PCM_IOCTL_DELAY(r0, 0x80084121, &(0x7f0000000340)) ioctl$SIOCRSSL2CALL(0xffffffffffffffff, 0x89e2, &(0x7f00000000c0)=@null) lseek(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[@ANYBLOB="651b00000000000100000000", @ANYRES32=0x0, @ANYBLOB="042704004000000014001400"/25], 0x3}, 0x1, 0x0, 0x0, 0x1}, 0x6020) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x800, 0x0) 00:18:25 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x2, 0xa, 0x4, 0x2000, 0x7f, {0x0, 0x2710}, {0x4, 0x8, 0x81, 0x81, 0x3f, 0x1, "aba59fe5"}, 0x10000, 0x3, @planes=&(0x7f0000000000)={0x10000, 0x1, @userptr=0x1f, 0x10000}, 0x0, 0x0, 0xffffffffffffffff}) ioctl$SIOCAX25DELFWD(r1, 0x89eb, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast}) r2 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$KVM_GET_IRQCHIP(r7, 0xc208ae62, &(0x7f0000000280)={0x0, 0x0, @ioapic}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r2, &(0x7f0000000140)={0x60002005}) r8 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r9, 0x0, r8) r10 = dup2(r2, r9) bind$rds(r10, &(0x7f0000000100)={0x2, 0x4e22, @broadcast}, 0x10) 00:18:25 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:25 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) write$binfmt_misc(r0, &(0x7f0000000280)={'syz0', "710bdbdc118626424bfb920e4fa09e789b6efe00bddf42e610276362937f233bd472846941acc958532cd1015ad092e39a7af11b59b2c30929930621d1287fc590bde81cd1125941143662c630a52969cc4568f0c236eba7e4ba2252696ed294a595541516af902487dd169d7b6e9827f81309364b09c3b98bb37a7b8ef4aae744bbbc7989a833076eac4fc851382e6998a2c181ae3cdbb1e1b755eb910a6bc93d9e28bc95a1"}, 0xaa) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$key(0xf, 0x3, 0x2) ioctl(r4, 0x4, &(0x7f00000001c0)="641ccb4673e83699fd6b4a3b68cd9bc4ad7828d171cb905b27198c11626335954c8e637aef201097c8994a22342b572abda3d0f6938477021e5946d5ea3f8421ff4dd55180d98891e94369e07bbb38a4f7fc29d4022b68118d088fbbbbd788f985") sendmsg$NL80211_CMD_SET_KEY(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)={0x100, 0x0, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac01}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x4}, @NL80211_ATTR_KEY={0x3c, 0x50, 0x0, 0x1, [@NL80211_KEY_MODE={0x5, 0x9, 0x2}, @NL80211_KEY_CIPHER={0x8, 0x3, 0xfac01}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT_TYPES={0x20, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "b1e083892c"}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @link_local}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x2c, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY={0x4c, 0x50, 0x0, 0x1, [@NL80211_KEY_MODE={0x5}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x4}, @NL80211_KEY_SEQ={0xd, 0x4, "9eed74919d69fe4387"}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_IDX={0x5, 0x2, 0x5}, @NL80211_KEY_MODE={0x5, 0x9, 0x2}, @NL80211_KEY_DEFAULT_MGMT={0x4}, @NL80211_KEY_DEFAULT_TYPES={0xc, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}]}, @NL80211_ATTR_KEY_CIPHER={0x8, 0x9, 0xfac05}]}, 0x100}, 0x1, 0x0, 0x0, 0x40}, 0x4001) 00:18:25 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) openat$urandom(0xffffffffffffff9c, 0x0, 0x40, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) getsockopt$MISDN_TIME_STAMP(r3, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0xb000000, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0x4}}]}, 0x34}}, 0x0) 00:18:25 executing program 1: setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x5, 0x20) setsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f00000000c0)="b9da05d3768678d22c9f7715aeaf365f534fb64180c4acfed5c103b03d5c36d545be8d42d54dce779fb626c08d48d69845cfd22882fe2caeed28f6183276d1410777c48bfb324c6d35693a0e1870b41980358e9e20dadf4dd1daea34e1a2a52873c02164485f63edce97d33a9447bfcd9f61676961048c309d44a49d2e83", 0x7e) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='syscall\x00') ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r2, 0xc01064c7, &(0x7f0000000240)={0x9, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000340)=0x6, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'geneve0\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x29d, @ipv4={[], [], @broadcast}, 0x7}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="0503040006003e0000004000c52cf7c25975e605b02f86ddeb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) [ 349.990284][ T9212] overlayfs: conflicting lowerdir path 00:18:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x1ff}, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$packet(0x11, 0x3, 0x300) openat$urandom(0xffffffffffffff9c, 0x0, 0x40, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) getsockopt$MISDN_TIME_STAMP(r3, 0x0, 0x1, &(0x7f00000002c0), &(0x7f0000000300)=0x4) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=@newtfilter={0x34, 0x2c, 0xd27, 0x0, 0xb000000, {0x0, 0x0, 0x0, r4, {}, {}, {0xf}}, [@filter_kind_options=@f_flower={{0xb, 0x1, 'flower\x00'}, {0x4}}]}, 0x34}}, 0x0) 00:18:25 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:25 executing program 3: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:25 executing program 5: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:25 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10040, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x303202, 0x0) ioctl$KVM_GET_MP_STATE(r3, 0x8004ae98, &(0x7f0000000280)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0)='nl80211\x00') r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00') r7 = socket(0x11, 0x800000003, 0x0) bind(r7, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c58110308d9123127ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r7, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$NL80211_CMD_GET_WIPHY(0xffffffffffffffff, &(0x7f000001d0c0)={0x0, 0x0, &(0x7f000001d080)={&(0x7f0000000000)={0x1c, r6, 0x709, 0x0, 0x0, {}, [@NL80211_ATTR_IFINDEX={0x8, 0x3, r8}]}, 0x1c}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(r5, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x24, r6, 0x4, 0x70bd26, 0x25dfdbfa, {}, [@NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "b95d72be3a"}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000080}, 0x40000c0) sendmsg$NFT_MSG_GETOBJ_RESET(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x6c, 0x15, 0xa, 0x201, 0x0, 0x0, {0x5, 0x0, 0x3}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x8}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xd}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}]}, 0x6c}, 0x1, 0x0, 0x0, 0x811}, 0x800) shutdown(r0, 0x1) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) [ 350.568140][ T9240] overlayfs: conflicting lowerdir path 00:18:26 executing program 1: setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x5, 0x20) setsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f00000000c0)="b9da05d3768678d22c9f7715aeaf365f534fb64180c4acfed5c103b03d5c36d545be8d42d54dce779fb626c08d48d69845cfd22882fe2caeed28f6183276d1410777c48bfb324c6d35693a0e1870b41980358e9e20dadf4dd1daea34e1a2a52873c02164485f63edce97d33a9447bfcd9f61676961048c309d44a49d2e83", 0x7e) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='syscall\x00') ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r2, 0xc01064c7, &(0x7f0000000240)={0x9, 0x0, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000340)=0x6, 0x4) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'geneve0\x00', 0x0}) bind$packet(r0, &(0x7f0000000140)={0x11, 0x0, r4, 0x1, 0x0, 0x6, @local}, 0x14) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x29d, @ipv4={[], [], @broadcast}, 0x7}, 0x1c) sendto$inet6(r0, &(0x7f0000000180)="0503040006003e0000004000c52cf7c25975e605b02f86ddeb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3fe257c3314", 0x202, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 00:18:26 executing program 0: ioctl$BINDER_THREAD_EXIT(0xffffffffffffffff, 0x40046208, 0x0) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, &(0x7f0000000180)='wg1\x00', 0x4) r3 = gettid() ioprio_set$pid(0x2, r3, 0x0) syz_open_procfs(r3, &(0x7f0000000240)='net\x00') r4 = gettid() ioprio_set$pid(0x2, r4, 0x0) syz_open_procfs(r4, &(0x7f0000000240)='net\x00') r5 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$VIDIOC_S_EXT_CTRLS(r7, 0xc0205648, &(0x7f0000000080)={0x4, 0x7, 0x20, r9, 0x0, &(0x7f0000000040)={0xa2092a, 0x9, [], @p_u32=&(0x7f0000000000)=0x4700000}}) perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x8, 0x5, 0xd5, 0x5, 0x0, 0x10000, 0x400, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfab7, 0x4, @perf_config_ext={0x7, 0x7fffffff}, 0x800, 0x1000000000000, 0x9, 0x6, 0x20000000, 0x9, 0xe9}, r3, 0x5, r10, 0x8) r12 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r12, &(0x7f0000000340)=ANY=[@ANYBLOB="1b5d326d00000000000000000000000000000000000000000000000003000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d3014f2afedffd0097d4a5f777125b0790d392459dd8cc6d09af3f89bc94715dfb7af1460a5ce4b13e27f4cee904"], 0x78) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)={r11, r12, 0x8}) 00:18:26 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:26 executing program 5: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:26 executing program 3: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:26 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) accept$packet(0xffffffffffffffff, &(0x7f0000004d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004dc0)=0x14) r3 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept$packet(r5, &(0x7f0000004e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004e40)=0x14) sendmmsg$inet(r1, &(0x7f0000005000)=[{{&(0x7f0000000100)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000140)="0d1cc5a0e7e0d581d64aca85aafa1970d84dd9a4313174eeca4ad7739f04eea5502cd990c12bb41bf10c64b8d54eb6d916b320d096fa33b007347558270000ef29b9329b395ced6b517630bf9069be8781876ac154fe4d02ae75fb8050e2a9f957c8d8ff72dbfadbe58d0d86cff0084bc1de8aa05ffc16259e1aaf282f736e9038b5f09dae47d2df3e94a7e032f0eb490d9e29896b80252be2f76fe8596d838a46661261681b443e812d1dffbfe3f78d1b01256bd8d2ddfcc33d5b9fd2530a9651e41849f21d3759", 0xc8}, {&(0x7f0000000280)="ca0741516f7b888db223b5e570bbfe216e74b13a8a025f9704c11561dfbd3c7b69e6b00b7ab8d111e4feca07b69ba404a12ec08068c2319f709da6292ca9151073ba64e2542658b39befa5a18b53791ad3e4e583460a5b173ae49f7b4a64ad6b903043ef68b5003294eaee3414b25136549121d72cca283c26c118d968461710473e6144ae1ae161f424159d517036551a61cc76f43cbde7c9a5187a379db78350111fbf1e732243dafe55c14fb263d626c1afd9c251a891c5f25ce3b135", 0xbe}], 0x2, &(0x7f0000000380)=[@ip_retopts={{0x84, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x54, 0xad, 0x3, 0x6, [{@broadcast, 0x7}, {@loopback, 0x8}, {@loopback, 0xfff}, {@rand_addr=0x4, 0x1000}, {@dev={0xac, 0x14, 0x14, 0xd}, 0x83}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}, {@local, 0x4}, {@rand_addr=0x5}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x5}, {@multicast1, 0x20}]}, @end, @timestamp_addr={0x44, 0x1c, 0xe4, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x670}, {@multicast1, 0x7fff}, {@broadcast, 0x257fe271}]}, @noop]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x7f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x59}}, @ip_retopts={{0x84, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0x85, [@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback]}, @timestamp_prespec={0x44, 0x24, 0xef, 0x3, 0x9, [{@empty, 0x5}, {@broadcast, 0x40}, {@loopback, 0x80000001}, {@loopback, 0x1}]}, @cipso={0x86, 0x27, 0x1, [{0x1, 0x2}, {0x0, 0x5, "7788ef"}, {0x5, 0xa, "ebe6abbd3ba7ebfc"}, {0x2, 0x7, "2937dbd196"}, {0x6, 0x9, "bb8550c4baf298"}]}, @lsrr={0x83, 0x1b, 0x9, [@multicast2, @empty, @loopback, @initdev={0xac, 0x1e, 0x0, 0x0}, @remote, @loopback]}]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}], 0x188}}, {{0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000540)="bf7aab2ca28a049b42549efcaf41313976d020cf96135a54d1ab32d26f77e3528557221c3cba6930b8d77b0ee9529cf1f43a20921c23", 0x36}, {&(0x7f0000000580)="174c26c0f69b5939cbdf57979dcb0f6e3b7ee82ce067f59e412a22a4570355ea528fb23d45", 0x25}, {&(0x7f00000005c0)="86c3fb23e8aaab63b773aad0dd8e02100140c14e543825401a85834733aff54f7eeca4d54524e1c050aa7f7b70ee7685eaeeb60ea0e599c147aa594f47b876646bf2ed065b6644687a107de19df339c72304916badcd4ca45317b2983b40998e5402f7f2fb9cec9917b08e8df786a3579a6e31ecf72b17b856a9da6261", 0x7d}, {&(0x7f0000000640)="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", 0xfc}], 0x4}}, {{&(0x7f0000000780)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}, 0x10, &(0x7f0000000840)=[{&(0x7f00000007c0)="cdd53d4d008795f52af353dceeecb4dbeea1c16321d4c75889c6556c28e4ee6e38d624c155a9c58401bb3e9eb74e657732e6d8066c375bf90a0a549feab369f4ca2e177904ec3ca2f2270977d5e7414107a18b2975fbf18afd5511517fdc67832b1030c27193b22c12ad6c6f5b96511dec30c170e3d766ad3e1195cb7aa2", 0x7e}, {&(0x7f00000008c0)="87f76aca7013547dcf155d9c124f3b9aff78e98dcc3da15a1f3f10d5c94007db99b680b50716da7351809cc44d7b5940e31ffaa3b21f5504f74998803db6ccaac6290c80ea885890bc7586366208c0e048dd9151a71d59ac36cccfde085b15461f7e4236c63e260a72e16a58ad925dc78cd1dbd32915e8e372a2c6d8770806a8e5ca179b33b01154bb52acd4e010036cd431a4916801a5730b904616b610b86c594f8fafc528de0a21019506b738f0652bd2c0adeec076138fb3c4420ee9d3a91fdd041e248e04d36d6bf26ae60b", 0xce}, {&(0x7f00000009c0)="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", 0x1000}, {&(0x7f00000019c0)="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", 0x1000}], 0x4, &(0x7f00000029c0)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}], 0x30}}, {{&(0x7f0000002a00)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000004d00)=[{&(0x7f0000002a40)="1dd0766e68de371d783d9df6466b8f4b7aef761ac77299fe08074d6c1e3329d44466ab7f5c6b495812a2ce843d3dac4311c32bfd4a489010f62949a4bd07e50d6004094ff5b5706ddc8ac29aa3abae4b0f9caef498cc2ceab58f3f09f78d79756ad57840badf0e5de39e3a1237ce64ec88e0289d379017dab707fdb7fa971af2a565d445bef1258a29fdc2737420a8e71c78e995831d30059cae5596d50f5f1683db41da69370dba8220fe5f3fa1173d16f3e0599fb414796e39175329faf771279d889158fde4b39cdbd3a557922a029117ecae6dc9ff", 0xd7}, {&(0x7f0000002b40)="ae0fec20eb27b4f4e4e2ae26f11a8c2654c282218c343738c04038e93898384cb9f042b1c34cc0287c77a2c8011287887d58ba3246f15fed0821ba049f6cfad633dbfeba5b671051888b561850da40b33c73a1dff20db0fcfb90a5fcf3329c2a87f2f35f5a04a4cfcc60d792bc700fe4b49c2ef8a308340da55babaad2342c9fab0d03a8fd562ece6c4ed1b8a3c41eba474baeeb8055e835c3406b805fb0097c5ab290b1bee7ee4f064d4c44e3720943e26efb23fa5b94b201a0021e4c74c856b253af6beb7e4a30f84ccd9da7108581dc", 0xd1}, {&(0x7f0000002c40)="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", 0x1000}, {&(0x7f0000003c40)="324241fa2394767c989ee0b5c7741a1f45bf6db4cb8439843cbc6183b1df6152ed963ff33be97424ed7866a846433fc1f18b150ff477bd4e29c5ec604599d856a7b15334e962dec91fed120c598cb74848d68e6e2f3b8bafd204e94b06374c7bcf4deaa1396b2a26a649b73190e2c38fa2b21565dcf018", 0x77}, {&(0x7f0000003cc0)="f493dce3", 0x4}, {&(0x7f0000003d00)="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", 0x1000}], 0x6, &(0x7f0000004e80)=[@ip_retopts={{0x20, 0x0, 0x7, {[@timestamp={0x44, 0x10, 0x80, 0x0, 0x4, [0x6, 0xfe, 0x4]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @remote, @multicast1}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @broadcast, @multicast2}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}, @ip_retopts={{0xa0, 0x0, 0x7, {[@rr={0x7, 0x17, 0x56, [@initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x48000, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1]}, @cipso={0x86, 0x6, 0x1}, @end, @timestamp={0x44, 0x1c, 0x3c, 0x0, 0x5, [0x0, 0x3, 0x6, 0x80000000, 0x7fff, 0x1]}, @cipso={0x86, 0x2d, 0x0, [{0x6, 0xc, "512a8e62efaa950add2a"}, {0x6, 0xf, "ac78dfb96e8d4e665f565182d9"}, {0x7, 0xc, "1662fde2dac6eaf2e827"}]}, @generic={0x89, 0xa, "24c33512f1fbe9f4"}, @lsrr={0x83, 0x1f, 0xec, [@loopback, @multicast2, @rand_addr=0x3, @empty, @multicast1, @multicast1, @broadcast]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @dev={0xac, 0x14, 0x14, 0x22}, @remote}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfffffff7}}], 0x170}}], 0x4, 0x20004000) r7 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet_MCAST_LEAVE_GROUP(r9, 0x0, 0x2d, &(0x7f0000000000)={0xffffffe1, {{0x2, 0x4e22, @multicast1}}}, 0x88) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:26 executing program 2: r0 = timerfd_create(0x0, 0x800) timerfd_settime(r0, 0x3, &(0x7f0000000000)={{0x77359400}, {0x0, 0x989680}}, 0x0) readv(r0, &(0x7f0000000240)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x2) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r4, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) shmctl$IPC_RMID(r4, 0x0) r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd08283856736a22) setuid(r6) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x6000, 0x100, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r9 = getpgrp(0xffffffffffffffff) r10 = gettid() ioprio_set$pid(0x2, r10, 0x0) syz_open_procfs(r10, &(0x7f0000000240)='net\x00') shmctl$IPC_SET(r4, 0x1, &(0x7f0000000300)={{0x2, r6, 0xee01, r7, r8, 0x8, 0x6}, 0x5, 0x4, 0x1, 0x2, r9, r10, 0x3}) r11 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) setsockopt$TIPC_MCAST_BROADCAST(r13, 0x10f, 0x85) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(0xffffffffffffffff, 0xc0405519, &(0x7f0000000040)={0x3, 0x5, 0x7ff, 0x2a0}) 00:18:26 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)={{0x1b, 0x5d, 0x32, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) dup(r1) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) [ 351.170463][ T27] audit: type=1800 audit(1582157906.743:45): pid=9272 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="SYSV00000000" dev="hugetlbfs" ino=0 res=0 00:18:26 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 351.292568][ T9273] overlayfs: conflicting lowerdir path 00:18:26 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:27 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:27 executing program 5: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200000000000df8, 0x6, 0xfffffffffffffffd, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x95, 0x0, 0x0, 0x0, 0x0, 0x80009a79}, 0x0, 0x1, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) write$P9_RVERSION(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="15000000fcb66592d7f00ab540d19f762665ffff01"], 0x15) r2 = dup(r1) syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c000000050000000c00000000000007bb0087092573900f26"], &(0x7f00000008c0)=""/162, 0x29, 0xa2}, 0x20) r4 = syz_open_dev$binderN(&(0x7f0000000840)='/dev/binder#\x00', 0x0, 0x800) r5 = fcntl$dupfd(r4, 0x406, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$inet_udplite(0x2, 0x2, 0x88) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) dup2(r6, r7) r8 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000400)=ANY=[@ANYRES32=r9, @ANYBLOB="00000004"], 0x0) r10 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r12, 0x84, 0x1f, &(0x7f00000000c0)={r9, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0xf850}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000500)={r9, 0x51, "afbc737ec6d9ae3441a38a4fd86ae0e4ae15c17c34d4fafa53b3de35cb9012dcf7aa4e098c696c1ade528a42c55f532068992e86188839a40f63806c6b9ace7e81ae5babf1ede9eb1c778b29c07a582dc7"}, &(0x7f0000000480)=0x59) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000005c0)={r13, 0x4}, 0xc) write$FUSE_BMAP(r2, &(0x7f0000000000)={0x18}, 0x18) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0x14c}, 0x26f) r14 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0xc4, 0x1) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="7923072c77666496859f2902907f3117d8c84ae78a237d3e3dd7d81c96c0590192c3e8987e60bf1a101db95dd53c67ad09b142aaed9266a5efc0ea2a6041ed7600e8", @ANYRESHEX=r14, @ANYBLOB=',\x00']) r15 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) write$dsp(r15, &(0x7f00000003c0)="a2", 0x1) r16 = socket(0x0, 0x3, 0x0) bind$isdn(0xffffffffffffffff, &(0x7f00000003c0)={0x22, 0xfffffffffffffff9, 0x1, 0x0, 0x8}, 0x6) write$dsp(0xffffffffffffffff, &(0x7f00000003c0)="a2", 0x1) syz_genetlink_get_family_id$batadv(0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={0x0}, 0x1, 0x0, 0x0, 0x4880}, 0x4000) setxattr$security_ima(&(0x7f0000000280)='./bus\x00', &(0x7f0000000440)='security.ima\x00', &(0x7f0000000640)=@v2={0x3, 0x3, 0x11, 0x7fffffff, 0xbe, "cce8cf70bd82b9cf2138cc34003383fa3de4d2bad77dc5d10b3052e58fddd628b721b176a0754f1b349070e6c3154bba33e80ff365bfdea750b9f89df97bc424f3c05502ff5fe95df771b0cfbb9fe6129d5d3f0526b5e2a98e14697b93ab7ba712b77a23863eac6730fc0adc228c989bc48bcfd8fa115dae0a97bb5f61ccceef353f317293f52084ba49c94fb01bef0830e4f44b284084dd75be47d9da3a8c7c14cb4a1637e456c03896d179e233c817de2c5796190872407b8030076bbe"}, 0xc7, 0x2) r17 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/key-users\x00', 0x0, 0x0) ioctl$CAPI_SET_FLAGS(r17, 0x80044324, &(0x7f0000000400)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r16, 0x84, 0x13, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r18 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r20 = fcntl$dupfd(r19, 0x0, r18) ioctl$PERF_EVENT_IOC_ENABLE(r20, 0x8912, 0x400200) r21 = socket$nl_generic(0x10, 0x3, 0x10) r22 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r21, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000002c0)={0x34, r22, 0xa8d4234d82e4b817, 0x0, 0x0, {{}, {0x0, 0xf}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'vcan0\x00'}}}}}, 0x34}}, 0x0) r23 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r25 = fcntl$dupfd(r24, 0x0, r23) ioctl$PERF_EVENT_IOC_ENABLE(r25, 0x8912, 0x400200) sendmsg$TIPC_CMD_GET_NETID(r25, &(0x7f00000009c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r22, 0x8, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) 00:18:27 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 351.634410][ T9288] overlayfs: conflicting lowerdir path 00:18:27 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) io_setup(0x8, &(0x7f0000000000)=0x0) io_destroy(r1) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) [ 351.762370][ T9296] overlayfs: conflicting lowerdir path 00:18:27 executing program 3: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = getpid() socket$inet6(0xa, 0x2, 0x0) dup(0xffffffffffffffff) connect$bt_sco(0xffffffffffffffff, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGUNIQ(0xffffffffffffffff, 0x80404508, &(0x7f0000000240)=""/87) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) sched_setscheduler(r2, 0x5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000080)='./bus\x00', 0x141043, 0x19) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000140)=@assoc_value={0x0, 0x839}, 0x8) getxattr(&(0x7f0000000100)='./bus\x00', &(0x7f00000002c0)=@known='trusted.overlay.upper\x00', 0x0, 0x0) ftruncate(r3, 0x200004) sendfile(r0, r3, 0x0, 0x80001d00c0d0) 00:18:27 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:27 executing program 5: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) getgid() socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:27 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:27 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$netrom_NETROM_T4(r6, 0x103, 0x6, &(0x7f0000000040)=0x1000, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$RTC_IRQP_SET(r3, 0x4008700c, 0x339) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_GET_NR_MMU_PAGES(r8, 0xae45, 0xffffffffffffffff) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r9, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:27 executing program 1: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 352.310949][ T9321] overlayfs: conflicting lowerdir path 00:18:28 executing program 3: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:28 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:28 executing program 5: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:28 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r2, 0x40a85323, &(0x7f0000000080)={{0x9, 0x6}, 'port0\x00', 0x11, 0x400, 0x3e3, 0x2a2, 0x8000, 0x5, 0xfffff15a}) r3 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$bt_BT_FLUSHABLE(r5, 0x112, 0x8, &(0x7f0000000000)=0x9, &(0x7f0000000040)=0x4) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r6, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:28 executing program 2: connect$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0x0, @hyper}, 0x10) syz_mount_image$xfs(&(0x7f0000000000)='xfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00']) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x8, 0x35, 0x1, 0x1}, 0x8) 00:18:28 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$bt_BT_POWER(r2, 0x112, 0x8, 0x0, &(0x7f0000000240)=0xfffffffffffffdac) [ 352.878755][ T9344] overlayfs: conflicting lowerdir path 00:18:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) arch_prctl$ARCH_GET_GS(0x1004, &(0x7f0000000000)) r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/adsp1\x00', 0x12180, 0x0) read$dsp(r0, &(0x7f0000000180)=""/4096, 0x1000) r1 = syz_open_dev$ptys(0xc, 0x3, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000001180)={0x51, "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"}) 00:18:28 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:28 executing program 5: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 353.011412][ T9352] XFS (loop2): Invalid superblock magic number 00:18:28 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:28 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) r6 = fcntl$dupfd(r3, 0x0, r5) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000000000)=@assoc_value, &(0x7f0000000040)=0x8) [ 353.252001][ T9369] overlayfs: conflicting lowerdir path 00:18:28 executing program 3: syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) syz_open_dev$usbfs(0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) connect$netrom(r1, &(0x7f0000000000)={{0x6, @rose}, [@rose, @rose, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose, @rose, @null]}, 0x48) listen(r1, 0x1) unshare(0x40000000) accept(r1, 0x0, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0x0, r4) r6 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) r8 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r8, &(0x7f0000000180)={{0x1b, 0x5d, 0x32, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) write$binfmt_elf64(r8, &(0x7f0000000080)=ANY=[@ANYRESDEC=r7, @ANYRESOCT=r4], 0x2b) socket$inet_udplite(0x2, 0x2, 0x88) setresgid(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, 0x0, 0x0) getpgrp(0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x20000000) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, 0x0) io_setup(0x0, 0x0) r9 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) syz_genetlink_get_family_id$devlink(&(0x7f0000000380)='devlink\x00') open(&(0x7f00000003c0)='./file0\x00', 0x90400, 0x240) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, 0x0, 0x20004040) io_cancel(0x0, 0x0, &(0x7f0000000180)) syz_genetlink_get_family_id$tipc(&(0x7f0000000440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x423}, 0x1c}}, 0x0) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x7]}) 00:18:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x81}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r1 = getpid() r2 = gettid() ioprio_set$pid(0x2, r2, 0x0) syz_open_procfs(r2, &(0x7f0000000240)='net\x00') r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/unix\x00') setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0, 0x2}, 0x8) sched_setscheduler(r1, 0x3, &(0x7f0000000380)=0x9) pipe(0x0) syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r4, 0x3305, 0x0) 00:18:29 executing program 5: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:29 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000000)='wg0\x00') 00:18:29 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:29 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000540)={0x80, &(0x7f0000000180), &(0x7f0000000340), 0x0, {0x14}, &(0x7f00000003c0)=""/37, 0x25, &(0x7f0000000400)=""/218, &(0x7f0000000500)=[0x0, 0xffffffffffffffff, r0], 0x3}, 0x50) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f00000002c0), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000700000000000001000003000000008e10"], 0x0, 0x1b}, 0x20) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1020c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000029c0)={&(0x7f0000002dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, {0xa, 0x4e23, 0x0, @loopback}}}, 0x80, 0x0}, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r11, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00O\x00\x00\x00'], 0x28}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000012c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="e00c00002d0088022abd7000ffdbdf2500000000", @ANYRES32=r11, @ANYBLOB="0400100001000c00000007000b0001006367726f757000005c0c0200580c02003c0001000100010003000000010000004243000001000000400107007f00030004000000200204008308c600010000000700000099b70000020e00000c000800080000000000000004040300030000000200000001010000ffffff7f01000000ff0f000004000000f3000000010000000100000007000000010000002000000000100000ff01000003000000000100000300000001000000020000007f0000000500000000000000e7a64247ffffff7f0300000003000000040000000800000004000000010400000200000002000000010000000300000001040000000000000100000000000000b5110000da920000020000000100000000080000040000000500000004000000ffffffffc10b00000100000004000000010001000900000006000000ff01000000080000080000000200000005000000460000000600000009000000010000002000000004000000000400000100010004000000510d00000600000008000000d90000000500000007000000000000003c0000002700000002000000feffffffc1000000c1ffffff070000000800000000900000000000006a00000004000000e1ffffffffffffff010001000600000008000000270000000000008004000000000000000300000000800000810000000000010000080000dd0a0000060000000002000007000000ff7f0000ffffff7f0000000007000000060000000400000002000000ff7f000000000080d9070000fbffffff010100000100000001000080030000009e340000090000000500000006000000ff7f00000400000006000000ff07000000800000070000000301000000000000000800000700000004000000080000000100000009000000178bffff01000000ffff00002000000002000000f7ffffff0000000005000000070000000900000004000000000000000800000002000000f7ffffffec9b0000090000000002000003000000c0000000fdffffff8907000003000000810000000500000007000000ffff000091d20000060000007f0000000300000004000000000000007f00000052090000ffffffffe803000009000000060000000800000009000000560000000800000006000000040000000100000005000000010000000900000000800000010000000100000004000000ce02000000800000090000000600000008000000000000800104000001000000b7ffffff0800000000000000f50f000080000000e10c0000030000000400000000000000000200000500000008000000020000000600000005000000be000000000800000104000000040000ff01000001000000d90000000700000000000000070000001f000000aa0e0000070000000300000005000000bb0a00000200000000800000ff0f000006000000050000007f00000056060000ff0f0000a09d0000ffffffff3d0e000008000000000000800100000009000000c887000008000000860b000005000000018000000100000047000000010000002700000040000000ff0100000404020086260000040000000600000001000000030000009d9f000062a3000008000000010000000500000004000000ffffff7fff7f0000ff0f00000400000003000000520100000500000000000100010000000700000005000000fbffffff07000000020000000500000000800000060000000004000000000000030000000000010005000000a200000001000000070000000300000002000000040000004000000002c3000005000000070000000200000002000000ea0000001f000000040000000900000003000000080000005c2500007f000000040000005bbeffff7f000000c70000004afe00001f8500000100000007000000080000001900000006000000060000007f0000000200000005000000030000000000000001000000080000000600000001000000ff0300000900000005000000010000000100000005000000001000007b06000008000000030000000300000005000000030000000100000000040000020000003f000000b7abe4192e0e000004000000000400000500000001000000ff7f000009000000030000008000000007000000f8ffffff00000080020000008c0000000300000009000000fe0000000300000000000000090000000400000009000000090000000000000000040000070000007f00000008000000ffff0000d3d6b71fed120000000000000900000009000000050000001f000000060000007a0f0000010000000200000002000000ff030000360500000100000098000000555a00000b00000000040000ff00000030040000000000c0ac0000004faa000007000000ff00000007000000010000000900000009000000fcffffff010000000400000007000000030000000800000004000000ea000000020000008e3400000500000000000000010000000300000082060000010100001f00000007000000ffff0000008000000010000006000000ff000000010000800100000007000000bb000000600000002000000003000000cb0000000200000006000000da770000080000000000010058060000b9890000060000000000000003000000020000003f000000010100000100ffffff7f0000ffffffff00100000080000000100010001f8ffff06000000ad000000ffffffff01000100ff030000960000001800000003000000c1bdffff08000000000000000100000000010000010000009702000038010000b4d6c873060000000000010008000000010000000100010002000000000000008d07000016050000ff0f000002000000ffffff7f4f0f000008000000ff03000006000000879f00000101000009000000ff07000008000000000001000400000006000000feffffff40000000080000000000000000000000ce000000f7ffffff03000000000070000700000001010000010000000500000004040200da82915e0100000006000000000000004affffff090000000300000000000000ffffffff0500000001000100d18e0000ffff00007f00000000000000ff0100006ef7000005000000ff01000004000000050000000000000005000000ffff000081000000ff0700006906000000000000000800000000000007000000ffffffff6d030000f706000002000000d294c127040000003f000000030000008fe200000000000008000000000000802b0000009200000002000000000080000000000008000000f9ffffff01000100090000000200000000000000060000000000000002000000010000000400000005000000e606000001800000ff0d00003f00000006000000ff0f0000040000000300000008000000ff030000080000000900000000800000feffffffff0f0000fe000000feffffff0200000008000000ec9fffff050000000200000076450000ff0000000300000000000000ffff0000800000000500000002000000000000000500000004000000fcffffff0900000001000000050000001f0000001f000000810000000500000007000000ff000000000001008720000003000000ff070000c04b0000ed0a0000ffffff7f06000000310000000000000020000000faffffff06000000010100000609e23b08000000a9000000010400000700000000800000000000fc08000000ff070000020000000101000002000000070000000101000009000000000000000900000008000000000000005e0100000200000008000000010001000080000005000000070000001f0000000100000006000000000200000900000003000000050000000200000000000000f8ffffff0400000095de000000000100f7ffffff02000000feffffff0300000001000000ff030000ff0f00000000000009000000c2000000e862274101000100010100000300000005000000190700004000000007000000010000009302000002000000ffffffff0100000004000000060000000010a900d3f6000001000100ecd4000003000000120d00007e0000000300000074ed0000070000007d0f000001000000a0430000ff7f000005000000010000000100000003000000040000000200000009000000400000000500000003000000010000000080000009000000e08331480000000000000100010000000600000005000000070000000700000009000000030000000100000000000000090000000100000008000000a6e5000000000000feffffff000001000800000002000000ff7f00001f000000000000000200000006000000060000000100000003000000000000004c0e000000000000050000001f74843309000000010000004b040000070000002000000001000000ffff05000000ffff0700000009000000080000007f00000005000000ff0f00000a0001007273767036000000200002001400020097a6853cfc59408eea98738fa3369e4a0800010005000c00060005002b0200000c0001007463696e6465780014000200060002000800000008000100013d0000"], 0xce0}}, 0x0) write$binfmt_misc(r5, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 353.605784][ T9390] Restarting kernel threads ... done. [ 353.640396][ T9392] IPVS: ftp: loaded support on port[0] = 21 [ 353.652645][ T9391] Restarting kernel threads ... done. 00:18:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x81}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r1 = getpid() r2 = gettid() ioprio_set$pid(0x2, r2, 0x0) syz_open_procfs(r2, &(0x7f0000000240)='net\x00') r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/unix\x00') setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0, 0x2}, 0x8) sched_setscheduler(r1, 0x3, &(0x7f0000000380)=0x9) pipe(0x0) syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r4, 0x3305, 0x0) 00:18:29 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$l2tp6(r3, &(0x7f0000000000)={0xa, 0x0, 0x8001, @loopback, 0x6, 0x1}, 0x20) [ 353.935747][ T9406] overlayfs: conflicting lowerdir path [ 353.963373][ T9392] IPVS: ftp: loaded support on port[0] = 21 00:18:29 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 354.067436][ T9419] Restarting kernel threads ... done. 00:18:29 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x81}, 0x0, 0x10000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x42800) open(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r1 = getpid() r2 = gettid() ioprio_set$pid(0x2, r2, 0x0) syz_open_procfs(r2, &(0x7f0000000240)='net\x00') r3 = syz_open_procfs(r2, &(0x7f0000000040)='net/unix\x00') setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0, 0x2}, 0x8) sched_setscheduler(r1, 0x3, &(0x7f0000000380)=0x9) pipe(0x0) syz_open_dev$dri(0x0, 0x1, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x1, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_KICK(r4, 0x3305, 0x0) 00:18:29 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = accept(r0, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000080)=0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)={0x20, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x340, r2, 0x20, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0xac, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x13100}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3000000}]}]}, @TIPC_NLA_MON={0x54, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff8001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x968e}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_PUBL={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8000}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x53a}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x200}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x393d}]}, @TIPC_NLA_MEDIA={0x120, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4000000}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x34d3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6dc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x409}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x401}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xb3c}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_LINK={0xb4, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7c4}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x65a}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfe63}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}]}, 0x340}, 0x1, 0x0, 0x0, 0x40861}, 0x8084040) 00:18:29 executing program 3: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:29 executing program 5: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 354.330259][ T9429] tipc: Started in network mode [ 354.353494][ T7] tipc: TX() has been purged, node left! [ 354.379757][ T9431] Restarting kernel threads ... done. [ 354.384114][ T9429] tipc: Own node identity 5, cluster identity 4711 [ 354.403704][ T9429] tipc: 32-bit node address hash set to 5 00:18:30 executing program 1: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:30 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000000)) 00:18:30 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 354.562115][ T9436] overlayfs: conflicting lowerdir path 00:18:30 executing program 2: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5, 0x0, 0xffffffffffffffff}, 0x0) clone3(&(0x7f0000000540)={0x80, &(0x7f0000000180), &(0x7f0000000340), 0x0, {0x14}, &(0x7f00000003c0)=""/37, 0x25, &(0x7f0000000400)=""/218, &(0x7f0000000500)=[0x0, 0xffffffffffffffff, r0], 0x3}, 0x50) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f00000002c0), 0x4) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="9feb01001800000000000700000000000001000003000000008e10"], 0x0, 0x1b}, 0x20) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1020c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000029c0)={&(0x7f0000002dc0)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x3, 0x0, 0x0, 0x0, {0xa, 0x4e23, 0x0, @loopback}}}, 0x80, 0x0}, 0x0) ioctl$KVM_SET_REGS(r4, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r4, 0xae80, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$netlink(0x10, 0x3, 0x0) r10 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001000250800000000000000000a000000", @ANYRES32=r11, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00O\x00\x00\x00'], 0x28}}, 0x0) sendmsg$nl_route_sched(r8, &(0x7f00000012c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="e00c00002d0088022abd7000ffdbdf2500000000", @ANYRES32=r11, @ANYBLOB="0400100001000c00000007000b0001006367726f757000005c0c0200580c02003c0001000100010003000000010000004243000001000000400107007f00030004000000200204008308c600010000000700000099b70000020e00000c000800080000000000000004040300030000000200000001010000ffffff7f01000000ff0f000004000000f3000000010000000100000007000000010000002000000000100000ff01000003000000000100000300000001000000020000007f0000000500000000000000e7a64247ffffff7f0300000003000000040000000800000004000000010400000200000002000000010000000300000001040000000000000100000000000000b5110000da920000020000000100000000080000040000000500000004000000ffffffffc10b00000100000004000000010001000900000006000000ff01000000080000080000000200000005000000460000000600000009000000010000002000000004000000000400000100010004000000510d00000600000008000000d90000000500000007000000000000003c0000002700000002000000feffffffc1000000c1ffffff070000000800000000900000000000006a00000004000000e1ffffffffffffff010001000600000008000000270000000000008004000000000000000300000000800000810000000000010000080000dd0a0000060000000002000007000000ff7f0000ffffff7f0000000007000000060000000400000002000000ff7f000000000080d9070000fbffffff010100000100000001000080030000009e340000090000000500000006000000ff7f00000400000006000000ff07000000800000070000000301000000000000000800000700000004000000080000000100000009000000178bffff01000000ffff00002000000002000000f7ffffff0000000005000000070000000900000004000000000000000800000002000000f7ffffffec9b0000090000000002000003000000c0000000fdffffff8907000003000000810000000500000007000000ffff000091d20000060000007f0000000300000004000000000000007f00000052090000ffffffffe803000009000000060000000800000009000000560000000800000006000000040000000100000005000000010000000900000000800000010000000100000004000000ce02000000800000090000000600000008000000000000800104000001000000b7ffffff0800000000000000f50f000080000000e10c0000030000000400000000000000000200000500000008000000020000000600000005000000be000000000800000104000000040000ff01000001000000d90000000700000000000000070000001f000000aa0e0000070000000300000005000000bb0a00000200000000800000ff0f000006000000050000007f00000056060000ff0f0000a09d0000ffffffff3d0e000008000000000000800100000009000000c887000008000000860b000005000000018000000100000047000000010000002700000040000000ff0100000404020086260000040000000600000001000000030000009d9f000062a3000008000000010000000500000004000000ffffff7fff7f0000ff0f00000400000003000000520100000500000000000100010000000700000005000000fbffffff07000000020000000500000000800000060000000004000000000000030000000000010005000000a200000001000000070000000300000002000000040000004000000002c3000005000000070000000200000002000000ea0000001f000000040000000900000003000000080000005c2500007f000000040000005bbeffff7f000000c70000004afe00001f8500000100000007000000080000001900000006000000060000007f0000000200000005000000030000000000000001000000080000000600000001000000ff0300000900000005000000010000000100000005000000001000007b06000008000000030000000300000005000000030000000100000000040000020000003f000000b7abe4192e0e000004000000000400000500000001000000ff7f000009000000030000008000000007000000f8ffffff00000080020000008c0000000300000009000000fe0000000300000000000000090000000400000009000000090000000000000000040000070000007f00000008000000ffff0000d3d6b71fed120000000000000900000009000000050000001f000000060000007a0f0000010000000200000002000000ff030000360500000100000098000000555a00000b00000000040000ff00000030040000000000c0ac0000004faa000007000000ff00000007000000010000000900000009000000fcffffff010000000400000007000000030000000800000004000000ea000000020000008e3400000500000000000000010000000300000082060000010100001f00000007000000ffff0000008000000010000006000000ff000000010000800100000007000000bb000000600000002000000003000000cb0000000200000006000000da770000080000000000010058060000b9890000060000000000000003000000020000003f000000010100000100ffffff7f0000ffffffff00100000080000000100010001f8ffff06000000ad000000ffffffff01000100ff030000960000001800000003000000c1bdffff08000000000000000100000000010000010000009702000038010000b4d6c873060000000000010008000000010000000100010002000000000000008d07000016050000ff0f000002000000ffffff7f4f0f000008000000ff03000006000000879f00000101000009000000ff07000008000000000001000400000006000000feffffff40000000080000000000000000000000ce000000f7ffffff03000000000070000700000001010000010000000500000004040200da82915e0100000006000000000000004affffff090000000300000000000000ffffffff0500000001000100d18e0000ffff00007f00000000000000ff0100006ef7000005000000ff01000004000000050000000000000005000000ffff000081000000ff0700006906000000000000000800000000000007000000ffffffff6d030000f706000002000000d294c127040000003f000000030000008fe200000000000008000000000000802b0000009200000002000000000080000000000008000000f9ffffff01000100090000000200000000000000060000000000000002000000010000000400000005000000e606000001800000ff0d00003f00000006000000ff0f0000040000000300000008000000ff030000080000000900000000800000feffffffff0f0000fe000000feffffff0200000008000000ec9fffff050000000200000076450000ff0000000300000000000000ffff0000800000000500000002000000000000000500000004000000fcffffff0900000001000000050000001f0000001f000000810000000500000007000000ff000000000001008720000003000000ff070000c04b0000ed0a0000ffffff7f06000000310000000000000020000000faffffff06000000010100000609e23b08000000a9000000010400000700000000800000000000fc08000000ff070000020000000101000002000000070000000101000009000000000000000900000008000000000000005e0100000200000008000000010001000080000005000000070000001f0000000100000006000000000200000900000003000000050000000200000000000000f8ffffff0400000095de000000000100f7ffffff02000000feffffff0300000001000000ff030000ff0f00000000000009000000c2000000e862274101000100010100000300000005000000190700004000000007000000010000009302000002000000ffffffff0100000004000000060000000010a900d3f6000001000100ecd4000003000000120d00007e0000000300000074ed0000070000007d0f000001000000a0430000ff7f000005000000010000000100000003000000040000000200000009000000400000000500000003000000010000000080000009000000e08331480000000000000100010000000600000005000000070000000700000009000000030000000100000000000000090000000100000008000000a6e5000000000000feffffff000001000800000002000000ff7f00001f000000000000000200000006000000060000000100000003000000000000004c0e000000000000050000001f74843309000000010000004b040000070000002000000001000000ffff05000000ffff0700000009000000080000007f00000005000000ff0f00000a0001007273767036000000200002001400020097a6853cfc59408eea98738fa3369e4a0800010005000c00060005002b0200000c0001007463696e6465780014000200060002000800000008000100013d0000"], 0xce0}}, 0x0) write$binfmt_misc(r5, &(0x7f0000000100)=ANY=[@ANYRESHEX], 0xffe8) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x0, 0x31, 0xffffffffffffffff, 0x0) [ 354.712705][ T9444] overlayfs: conflicting lowerdir path 00:18:30 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$USERIO_CMD_SET_PORT_TYPE(r3, &(0x7f0000000140)={0x1, 0x8}, 0x2) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) r6 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) r8 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r10, 0x110, 0x5, &(0x7f00000001c0)=[0x1, 0x3], 0x2) write$binfmt_elf64(r5, &(0x7f0000000180)=ANY=[@ANYRESOCT=r0], 0x17) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x8, 0xb, 0x4, 0x100000, 0x3ff, {}, {0x1, 0x8, 0x40, 0xa6, 0x40, 0x2, "599a6fa6"}, 0xffffb77f, 0x4, @offset=0x7, 0x7, 0x0, r5}) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x2) renameat(r4, &(0x7f0000000040)='./file0\x00', r11, &(0x7f0000000100)='./file0\x00') 00:18:30 executing program 3: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:30 executing program 1: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:30 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$P9_RCLUNK(r1, &(0x7f0000000040)={0x7}, 0x7) r3 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000002c0)={0x34, r7, 0xa8d4234d82e4b817, 0x0, 0x0, {{}, {0x0, 0xf}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'vcan0\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(r5, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r7, 0x20, 0x70bd28, 0x25dfdbfe, {{}, {}, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x40448d0}, 0x20000) bind$alg(r2, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r8 = accept4$alg(r2, 0x0, 0x0, 0x0) vmsplice(r1, &(0x7f0000001380)=[{&(0x7f0000000000)="02", 0xfffffe80}], 0x1, 0xe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) splice(r0, 0x0, r8, 0x0, 0x20000000003, 0x0) 00:18:30 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:30 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:31 executing program 5: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee00, r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r6 = gettid() ioprio_set$pid(0x2, r6, 0x0) syz_open_procfs(r6, &(0x7f0000000240)='net\x00') r7 = getpgid(r6) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x34, 0x80, 0x7f, 0x0, 0xcaa1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xe91, 0x4, @perf_config_ext={0x1, 0x2}, 0x0, 0x3, 0x1, 0x4, 0x0, 0xfff, 0x9e8}, r7, 0x10, 0xffffffffffffffff, 0xb) ioctl$EVIOCGSW(r5, 0x8040451b, &(0x7f00000001c0)=""/165) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r8, &(0x7f0000000440)=""/400, 0xff3b) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) pipe2$9p(0x0, 0x0) ftruncate(r9, 0x200004) r10 = dup(0xffffffffffffffff) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x1}, 0x8) sendfile(r3, r9, 0x0, 0x80001d00c0d0) ioctl$FS_IOC_GETVERSION(r10, 0x80087601, &(0x7f0000000140)) 00:18:31 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x106) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) 00:18:31 executing program 1: socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@local, 0x4c}) ptrace$setopts(0x4206, r0, 0x0, 0x4) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffd71}, {0x0, 0x1e1}, {&(0x7f00000002c0)=""/66, 0x9}], 0x3, 0x0, 0xb9, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:18:31 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:31 executing program 2: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x1) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet6(r3, &(0x7f0000000000)={0xa, 0xfffe, 0x0, @loopback, 0x9}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/416], 0x28) sendmmsg(r0, &(0x7f00000092c0), 0x400000000000064, 0x0) 00:18:31 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400000, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) r5 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r6, 0x0, r5) dup3(r5, 0xffffffffffffffff, 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_QBUF(r9, 0xc058560f, &(0x7f0000000340)={0x5bfdb65d, 0xa, 0x4, 0x20000, 0x7, {0x0, 0x2710}, {0x2, 0xc, 0x6, 0xff, 0xff, 0x5, "72181bdc"}, 0x9, 0x1, @offset=0x8e, 0x4, 0x0, 0xffffffffffffffff}) getsockopt$sock_buf(r10, 0x1, 0x1c, &(0x7f00000003c0)=""/26, &(0x7f0000000400)=0x1a) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000280)={0xffffffffffffffff}, 0x106, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r1, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000040), r11}}, 0x18) 00:18:31 executing program 1: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:31 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x13) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)="390000001300034700bb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ffff0606040000000000000000", 0x39}], 0x1) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) 00:18:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee00, r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r6 = gettid() ioprio_set$pid(0x2, r6, 0x0) syz_open_procfs(r6, &(0x7f0000000240)='net\x00') r7 = getpgid(r6) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x34, 0x80, 0x7f, 0x0, 0xcaa1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xe91, 0x4, @perf_config_ext={0x1, 0x2}, 0x0, 0x3, 0x1, 0x4, 0x0, 0xfff, 0x9e8}, r7, 0x10, 0xffffffffffffffff, 0xb) ioctl$EVIOCGSW(r5, 0x8040451b, &(0x7f00000001c0)=""/165) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r8, &(0x7f0000000440)=""/400, 0xff3b) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) pipe2$9p(0x0, 0x0) ftruncate(r9, 0x200004) r10 = dup(0xffffffffffffffff) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x1}, 0x8) sendfile(r3, r9, 0x0, 0x80001d00c0d0) ioctl$FS_IOC_GETVERSION(r10, 0x80087601, &(0x7f0000000140)) 00:18:31 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) r3 = dup3(0xffffffffffffffff, r2, 0x0) ioctl$SOUND_MIXER_WRITE_VOLUME(r3, 0xc0044d1b, &(0x7f0000000000)=0x3c) 00:18:31 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:32 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 356.418586][ T9515] overlayfs: conflicting lowerdir path 00:18:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee00, r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r6 = gettid() ioprio_set$pid(0x2, r6, 0x0) syz_open_procfs(r6, &(0x7f0000000240)='net\x00') r7 = getpgid(r6) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x34, 0x80, 0x7f, 0x0, 0xcaa1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xe91, 0x4, @perf_config_ext={0x1, 0x2}, 0x0, 0x3, 0x1, 0x4, 0x0, 0xfff, 0x9e8}, r7, 0x10, 0xffffffffffffffff, 0xb) ioctl$EVIOCGSW(r5, 0x8040451b, &(0x7f00000001c0)=""/165) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r8, &(0x7f0000000440)=""/400, 0xff3b) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) pipe2$9p(0x0, 0x0) ftruncate(r9, 0x200004) r10 = dup(0xffffffffffffffff) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x1}, 0x8) sendfile(r3, r9, 0x0, 0x80001d00c0d0) ioctl$FS_IOC_GETVERSION(r10, 0x80087601, &(0x7f0000000140)) 00:18:32 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SOUND_PCM_READ_RATE(r4, 0x80045002, &(0x7f0000000100)) r5 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r8, 0x84, 0x10, &(0x7f0000000000)=@assoc_value={0x0, 0x7}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xa, &(0x7f0000000080)={0x8, 0x1ff, 0x8, 0x4, 0x1, 0x1, 0x5, 0x7ff, r9}, &(0x7f00000000c0)=0x20) r10 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r10, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:32 executing program 1: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:32 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:32 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:32 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x0, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, &(0x7f0000000280)=""/225) sendmsg$FOU_CMD_ADD(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="1c000000a37acc77e6bcd9c00d3b2b19a6cda5a6a4889d031e62ea43390c243b4fc2de4c62d364b9f2850297f9007091b3cfae72a07b1bad543d7b441cc041bfefbd729ba4f7f6c200"/86, @ANYRES16=0x0, @ANYBLOB="20002bbd7000ffdbdf2501000000050002002f000000"], 0x1c}, 0x1, 0x0, 0x0, 0x20000044}, 0x10) [ 357.131701][ T9550] overlayfs: conflicting lowerdir path 00:18:33 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x8, 0x0, &(0x7f0000000040)) 00:18:33 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:33 executing program 3: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:33 executing program 1: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 357.567475][ T9564] overlayfs: conflicting lowerdir path 00:18:33 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x400040, 0x24) write$FUSE_INTERRUPT(r4, &(0x7f0000000040)={0x10, 0xfffffffffffffffe, 0x6}, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 00:18:33 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:33 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee00, r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r6 = gettid() ioprio_set$pid(0x2, r6, 0x0) syz_open_procfs(r6, &(0x7f0000000240)='net\x00') r7 = getpgid(r6) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x34, 0x80, 0x7f, 0x0, 0xcaa1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xe91, 0x4, @perf_config_ext={0x1, 0x2}, 0x0, 0x3, 0x1, 0x4, 0x0, 0xfff, 0x9e8}, r7, 0x10, 0xffffffffffffffff, 0xb) ioctl$EVIOCGSW(r5, 0x8040451b, &(0x7f00000001c0)=""/165) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r8, &(0x7f0000000440)=""/400, 0xff3b) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) pipe2$9p(0x0, 0x0) ftruncate(r9, 0x200004) r10 = dup(0xffffffffffffffff) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x1}, 0x8) sendfile(r3, r9, 0x0, 0x80001d00c0d0) ioctl$FS_IOC_GETVERSION(r10, 0x80087601, &(0x7f0000000140)) 00:18:33 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 358.083253][ T8096] tipc: TX() has been purged, node left! 00:18:33 executing program 1: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:33 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x300, 0x0) getegid() ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r1, 0x8983, &(0x7f0000000140)) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="7d00000033e29ae905000000e290dbe414001feadfbf31a41c22a692edb7dda7ffca6fa4e1f68c7b341a8cc78074230c068917548273d1cc127c592e2d42ac9d035d8346715c2612afbc16e9171d1053d1ca4c1ef4dfc2b0004f64aa437c0781ee333f832a1f6befff5bf18d75ba49a6b1c705e23939780f47a8a6b646cc4d7b23"], &(0x7f0000000080)=0x85) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f00000000c0)={r2, 0x401, 0x10}, 0xc) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r3 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r8, 0x84, 0x6e, &(0x7f0000000480)=[@in={0x2, 0x4e23, @multicast1}, @in={0x2, 0x4e23, @rand_addr=0x4}, @in6={0xa, 0x4e22, 0x400, @mcast1, 0xc484}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e1e, @dev={0xac, 0x14, 0x14, 0x4a}}, @in={0x2, 0x4e20, @loopback}], 0x6c) r9 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = syz_genetlink_get_family_id$fou(&(0x7f00000002c0)='fou\x00') sendmsg$FOU_CMD_ADD(r11, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)={0x54, r12, 0x10, 0x70bd25, 0x25dfdbff, {}, [@FOU_ATTR_AF={0x5, 0x2, 0x2}, @FOU_ATTR_PEER_V4={0x8, 0x8, @remote}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e27}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e20}, @FOU_ATTR_PEER_V6={0x14, 0x9, @mcast1}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_IPPROTO={0x5, 0x3, 0x239c20ab7aa52ebb}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x8000) [ 358.519283][ T9602] overlayfs: conflicting lowerdir path 00:18:34 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc3, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) r1 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0xee00, r2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) close(r3) r4 = socket$inet6_sctp(0xa, 0x801, 0x84) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) r6 = gettid() ioprio_set$pid(0x2, r6, 0x0) syz_open_procfs(r6, &(0x7f0000000240)='net\x00') r7 = getpgid(r6) perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x34, 0x80, 0x7f, 0x0, 0xcaa1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xe91, 0x4, @perf_config_ext={0x1, 0x2}, 0x0, 0x3, 0x1, 0x4, 0x0, 0xfff, 0x9e8}, r7, 0x10, 0xffffffffffffffff, 0xb) ioctl$EVIOCGSW(r5, 0x8040451b, &(0x7f00000001c0)=""/165) r8 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') getdents(r8, &(0x7f0000000440)=""/400, 0xff3b) getsockopt$IP6T_SO_GET_INFO(r8, 0x29, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000040)=0x54) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) connect$inet6(r4, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r9 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) pipe2$9p(0x0, 0x0) ftruncate(r9, 0x200004) r10 = dup(0xffffffffffffffff) write$FUSE_BMAP(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x1}, 0x8) sendfile(r3, r9, 0x0, 0x80001d00c0d0) ioctl$FS_IOC_GETVERSION(r10, 0x80087601, &(0x7f0000000140)) 00:18:34 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:34 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:34 executing program 1: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 359.021753][ T9618] overlayfs: conflicting lowerdir path 00:18:35 executing program 5: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:35 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:35 executing program 3: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:35 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:35 executing program 1: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 359.580948][ T9631] overlayfs: conflicting lowerdir path [ 359.729169][ T9635] overlayfs: conflicting lowerdir path 00:18:35 executing program 5: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:35 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:35 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:35 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001043, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x2) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) close(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000340)={'veth1_to_batadv\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x101000, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000002c0)={0x34, r7, 0xa8d4234d82e4b817, 0x0, 0x0, {{}, {0x0, 0xf}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'vcan0\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r5, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x1c, r7, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [""]}, 0x1c}}, 0x20000804) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r4}}, 0x20}}, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3, &(0x7f0000003a00)=[{0x0}, {&(0x7f0000002980)}, {&(0x7f0000002a00), 0x0, 0x2}], 0x100480, &(0x7f0000003ac0)={[{@uni_xlate='uni_xlate=1'}], [{@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}, {@pcr={'pcr'}}, {@appraise_type='appraise_type=imasig'}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x9) [ 360.214811][ T9650] overlayfs: conflicting lowerdir path [ 360.267544][ T9655] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 360.283651][ T9655] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 360.299282][ T9655] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 360.312524][ T9655] batman_adv: batadv0: Removing interface: batadv_slave_1 00:18:36 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000040)={@ipv4={[], [], @loopback}, 0x0}, &(0x7f0000000080)=0x14) bind$can_raw(r0, &(0x7f0000000100)={0x1d, r1}, 0x10) r2 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_raw(r2, &(0x7f0000000000)={0x1d, r3}, 0x10) dup2(r2, r0) 00:18:36 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:36 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x88002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00', 0x420000015001}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @empty}}) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl(r2, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") write$tun(r0, &(0x7f00000000c0)={@void, @val, @mpls={[], @ipv4=@icmp={{0x8, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, {[@lsrr={0x83, 0x7, 0xfa, [@broadcast]}, @lsrr={0x83, 0x3}]}}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast, {[@generic={0x94, 0xb, "530298040f2dd7dc6e"}]}}}}}}, 0x52) r3 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockname$packet(r5, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) 00:18:36 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:36 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() ioprio_set$pid(0x2, r4, 0x0) syz_open_procfs(r4, &(0x7f0000000240)='net\x00') r5 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd08283856736a22) setuid(r6) getresgid(&(0x7f0000000700), &(0x7f0000000740), &(0x7f0000000780)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000007c0)={0x0}, &(0x7f0000000800)=0xc) r9 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r9, &(0x7f0000000180)={{0x1b, 0x5d, 0x32, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) fstat(r9, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r11) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f00000008c0)='\x00', 0xffffffffffffffff}, 0x30) newfstatat(0xffffffffffffff9c, &(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2000) r14 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r15, 0x0, r14) r16 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r17, 0x0, r16) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000a40)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000a00)='\\&]:em0,$\x00', 0xffffffffffffffff}, 0x30) r19 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r19, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xfd08283856736a22) setuid(r20) r21 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r21, &(0x7f0000000180)={{0x1b, 0x5d, 0x32, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r22 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r23, 0x0, r22) r24 = socket$nl_crypto(0x10, 0x3, 0x15) r25 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r26, 0x0, r25) r27 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r27, &(0x7f0000000180)={{0x1b, 0x5d, 0x32, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) r28 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r29, 0x0, r28) r30 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r3, &(0x7f0000000b80)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000080)="1386303a6a768fb959f270139a215422de59eb888f80de547ccd2b83b6239a95b91e78456b1a52646fb0ce5357585b2bee5fde51db60ac7810c9df428b26033b26121a030712a7b831419b84438dba11ebcc9f5d20f6ed8084a3564eeeb2a8fcdac1ed773469942c6e856f13a048f05eb3007d98559b81c3513b2ace2cc51918caea707f05d6e3d5243ffaa761c4a7b1e023ef99dcf606691f84a378dd21607f2227626f", 0xa4}, {&(0x7f0000000140)="e24ad72fb2c48fa3702e6b8fa10b438e250ceaf3e43d3bb21dea4b9f0aebe0a4cae2f98abf4bb84632487008daf2fb22c65ef3fc096b9b24a28fe229eba117cb0e275c760a429e7b5995d0ee251bb934bf43b9af0cb77ead1e33499fe44141cf80b138c04177c230d81e7629c9517eabfa8e3733513995cedd589f36bdad6f5a183e61092fb2360c9d0e075bd7ce69e37b0cfa781283da8bcb2479b7cf1d845b5c0c", 0xa2}, {&(0x7f0000000280)="2c85d0999d533b8899adb682ad27a6bd8a33c0621f9aa264f5974f0249a009b6fc6a8570245f75373c6ead9b12dab8c12b395d7396164a9943ed6cc7f45598b7fdc9050b04907af54b3c88d4c2b8a98d9dde3fd351805fc8940665827c7efbb2ae6b35ada66f62d55a287731e28623687de9837f9db9095abbc66c1066cef53b8b69d0382d14b5eb5010ff8d9da55d68", 0x90}, {&(0x7f0000000200)="9199942ec63377b8f350de0f9ca5a306aad672f023dc02b5", 0x18}, {&(0x7f0000000340)="715bf2901c67855366320b3c68187483589d4e3378740fae4b6bb6c56c72bf4417b3afb1326e3d67d3783b151289a5f13284c078c006f62e0725bd56db3ecae8d60b037ade1061f81301fd3f04b87cea8ece4f367972d19d4253f4ee10d3bbd650b9118429e320cd8da6fe29660f741e3b40dfdf559fbc0b2331e5d3ebcccf7424bfda96ff3e8f9ca5e0518ed21c4ce02d0f1a87644cd2746825f9f0667c90d39823de01052c1d1e948108f2f5b9155e3ded1a57ef2a9ff0dd7fbf8186e926d2cce9655768106f93e7973fee54e6b6529ac3b06e47367f1a515ff53c8abe4b919c2100a5829a239e93bac134e524cd984cbf", 0xf2}, {&(0x7f0000000440)="f9b4882d0bbc39e0d878f357ecbe062229d238e1ae297fe4ff7ee6a436eb95004ad215f571769a617403686895d8015163c0aeb9374c5b8f4f6c4903636cf5e47ade4541c5745edc717ca2fa9e1fe51a4fe81f19a93d8965039a", 0x5a}, {&(0x7f00000004c0)="aa7ed473e04f1d2fbb32fe48712cf7464cfd55acbc708284", 0x18}, {&(0x7f0000000500)="c10c7c18c77b415c48594996de25aa24f546a76f74d6aebcad3ef2c9d0a040ec2a2ed8a4d6f5e6330e46ea747449350adf17c4f2b0eaa55389c58a4485aa544d72d20d63c4a9ae9aa27f59a62e2fbe75a3e1bc1cc820dbba0fc54255d3170f83cf892f89c954eac78c70e4ca2305", 0x6e}, {&(0x7f0000000580)="c06e14c6fc0ee1de4dcab3954c61037f13e3499aeb06b0862a9d93dff74a08a8dd7726e99d6c27ac791451c11122bc5c5673a60558f4b4c898350e3bd7a0b0c786a14f221f6e149d03dc6fb038e2aac843f9a3f4ffa9397f77759909484ce92df4cab2b00c8587", 0x67}, {&(0x7f0000000600)="0c743d2d522c508b3fa0412590", 0xd}], 0xa, &(0x7f0000000a80)=[@cred={{0x1c, 0x1, 0x2, {r4, r6, r7}}}, @cred={{0x1c, 0x1, 0x2, {r8, r10, r11}}}, @cred={{0x1c, 0x1, 0x2, {r12, r13, 0xee00}}}, @rights={{0x1c, 0x1, 0x1, [r14, r0, r17]}}, @cred={{0x1c, 0x1, 0x2, {r18, r20, 0xee01}}}, @rights={{0x1c, 0x1, 0x1, [r21, r22, r24]}}, @rights={{0x18, 0x1, 0x1, [r26, r27]}}, @rights={{0x18, 0x1, 0x1, [r28, r30]}}], 0xf0, 0x4000080}, 0x4004880) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:36 executing program 1: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:36 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCX25SFACILITIES(r3, 0x89e3, &(0x7f0000000040)={0x77, 0xf659, 0x9, 0xa, 0x4, 0x7303899df3ccf53b}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x406, r0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$CAN_RAW_JOIN_FILTERS(r8, 0x65, 0x6, &(0x7f0000000100), &(0x7f0000000080)=0x4) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:36 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:36 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001043, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x2) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) close(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000340)={'veth1_to_batadv\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x101000, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000002c0)={0x34, r7, 0xa8d4234d82e4b817, 0x0, 0x0, {{}, {0x0, 0xf}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'vcan0\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r5, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x1c, r7, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [""]}, 0x1c}}, 0x20000804) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r4}}, 0x20}}, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3, &(0x7f0000003a00)=[{0x0}, {&(0x7f0000002980)}, {&(0x7f0000002a00), 0x0, 0x2}], 0x100480, &(0x7f0000003ac0)={[{@uni_xlate='uni_xlate=1'}], [{@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}, {@pcr={'pcr'}}, {@appraise_type='appraise_type=imasig'}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x9) 00:18:36 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:36 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) io_setup(0x5, &(0x7f0000000040)=0x0) io_pgetevents(r1, 0x4, 0x3, &(0x7f00000000c0)=[{}, {}, {}], 0x0, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x583581, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x0, 0x0) r3 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$FUSE_INIT(r5, &(0x7f0000000280)={0x50, 0xffffffffffffffda, 0x1, {0x7, 0x1f, 0x100, 0x500910, 0x7ffc, 0x200, 0x7, 0x299}}, 0x50) mmap$xdp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000a, 0x80010, r2, 0x80000000) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, &(0x7f0000000080)) [ 361.028508][ T9682] overlayfs: conflicting lowerdir path 00:18:36 executing program 1: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 361.332117][ T9697] overlayfs: conflicting lowerdir path 00:18:37 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:37 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000000)=0x1) 00:18:37 executing program 5: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:37 executing program 2: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001043, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x2) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) close(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000340)={'veth1_to_batadv\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x101000, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000002c0)={0x34, r7, 0xa8d4234d82e4b817, 0x0, 0x0, {{}, {0x0, 0xf}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'vcan0\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r5, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x1c, r7, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [""]}, 0x1c}}, 0x20000804) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r4}}, 0x20}}, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3, &(0x7f0000003a00)=[{0x0}, {&(0x7f0000002980)}, {&(0x7f0000002a00), 0x0, 0x2}], 0x100480, &(0x7f0000003ac0)={[{@uni_xlate='uni_xlate=1'}], [{@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}, {@pcr={'pcr'}}, {@appraise_type='appraise_type=imasig'}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x9) 00:18:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)={0x14, 0x3e, 0x105, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) 00:18:37 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000000)={0xa52, {{0xa, 0x4e22, 0x4, @local, 0x8}}}, 0x88) 00:18:37 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x2001043, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000003b80)='./file0\x00', &(0x7f0000003bc0)='trusted.overlay.opaque\x00', 0x0, 0x0, 0x2) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'batadv0\x00', 0x0}) close(0xffffffffffffffff) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, &(0x7f0000000340)={'veth1_to_batadv\x00', {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}}) bind$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @local}, 0x14) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000001c0), 0x12) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000380)='/dev/nvram\x00', 0x101000, 0x0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000002c0)={0x34, r7, 0xa8d4234d82e4b817, 0x0, 0x0, {{}, {0x0, 0xf}, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'vcan0\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_SHOW_PORTS(r5, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000400)={0x1c, r7, 0x800, 0x70bd2b, 0x25dfdbfd, {}, [""]}, 0x1c}}, 0x20000804) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)=@newlink={0x20, 0x11, 0x40d, 0x0, 0x0, {0x10, 0x0, 0x0, r4}}, 0x20}}, 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x3, &(0x7f0000003a00)=[{0x0}, {&(0x7f0000002980)}, {&(0x7f0000002a00), 0x0, 0x2}], 0x100480, &(0x7f0000003ac0)={[{@uni_xlate='uni_xlate=1'}], [{@dont_hash='dont_hash'}, {@dont_measure='dont_measure'}, {@pcr={'pcr'}}, {@appraise_type='appraise_type=imasig'}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000240)) tkill(0x0, 0x9) 00:18:37 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x4c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x33f, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:18:37 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) sched_getscheduler(0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x200, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$l2tp6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$CAPI_GET_MANUFACTURER(r6, 0xc0044306, &(0x7f00000000c0)=0x8) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) sendto$inet(r7, &(0x7f0000000040)="6f690d55c35f6113628a7e55f6495cc3d3ae99d39a6fd50df05fac6b7a6af113bcfcc319daf6dc1439af8b00e02a616838798d989e816577e352ac208c5764", 0x3f, 0x4055, &(0x7f0000000080)={0x2, 0x4e24, @multicast1}, 0x10) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:37 executing program 2: socket(0x40000000015, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000000)) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='net/arp\x00') openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/bus/input/handlers\x00', 0x0, 0x0) socket(0x11, 0x800000003, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(0xffffffffffffffff, 0x2275, &(0x7f0000009a00)) accept$ax25(0xffffffffffffffff, &(0x7f0000000080)={{0x3, @netrom}, [@rose, @bcast, @remote, @default, @null, @rose, @rose, @default]}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f000000af00)=[{{0x0, 0x0, &(0x7f0000000200)}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000009a00)}}, {{0x0, 0x0, &(0x7f0000009cc0)=[{0x0}], 0x1}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f000000ae00)}}], 0x5, 0x0) semget(0x1, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x0, 0x81, @rand_addr="1649ed8479a26691795a2c14efc46997", 0x4}, @in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x0, 0x1f, @remote, 0x1002}, @in6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, 0x0) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x40046f41, 0x76006e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x127c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76006e) 00:18:37 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000200)={0x9, 0x80000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x1, 0x10000, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x40) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="100225bd7000fbdbdf2508000000050030000000001105465130f23b1375750749a750cd77ae6a9c0885a7"], 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x50) close(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) socket$kcm(0x10, 0x2, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 00:18:38 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) utimensat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)={{0x77359400}, {0x0, 0x2710}}, 0x100) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f0000000040)={0x3b38, 0x7, 0x4, 0x800, 0xfffffffa, {r3, r4/1000+30000}, {0x4, 0x1, 0x9, 0x1, 0x1f, 0x35, "0727a90d"}, 0x1, 0x2, @userptr=0x2, 0x9, 0x0, 0xffffffffffffffff}) getpeername$netrom(r5, &(0x7f00000000c0)={{0x3, @bcast}, [@netrom, @default, @netrom, @default, @bcast, @default, @null, @rose]}, &(0x7f0000000140)=0x48) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r6, &(0x7f0000000180)={0x1f, 0x8000, @fixed={[], 0x10}, 0xff, 0x1}, 0xe) getsockopt$bt_BT_POWER(r6, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:38 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_elf64(r2, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}], "c9e10d95a0886afd34d2cff69c1420bdb19ecf9aaa4b28ae5d98226c1f4d9460ca06a9a38e72a5a8f866d7bd28289889532a710ed185c8f5340ec7e9b9abb508b8bb35f0afc3e722cd1cd11ac7143cb6622d087af6d269daa78b8262b39cfe7e16f2e9a572469b7d96e3ba22bbacd3d6916d2917db65ecb0da3d27da532307b29db21f19d2f4515b5451b6cbd2e197c20c488a623f1c9cb5ebf7f7b4d57842b8fd3a47b1a14c083e3922b49b46", [[], []]}, 0x325) [ 362.709731][ T9758] ubi0: attaching mtd0 [ 362.713280][ T21] tipc: TX() has been purged, node left! [ 362.740676][ T9758] ubi0: scanning is finished [ 362.789756][ T9758] ubi0: empty MTD device detected [ 362.914802][ T9758] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 00:18:38 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000040)=r4, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x8, 0x0, &(0x7f0000000240)) r7 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r9, 0xc0505350, &(0x7f0000000080)={{0x80, 0xff}, {0x0, 0x55}, 0x7, 0x0, 0xfd}) 00:18:38 executing program 2: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000040)={0x8, 0x3, 0x4, 0x70000, 0x3ff, {}, {0x5, 0x8, 0x3, 0x0, 0x0, 0x1b, "1100"}, 0x40, 0x3, @fd, 0x9, 0x0, 0xffffffffffffffff}) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) r1 = msgget$private(0x0, 0x400) msgrcv(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xef, 0x3, 0x1000) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vga_arbiter\x00', 0x280082, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r2, 0x0, 0x800) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xf17) unshare(0x40040400) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x80000, 0x4) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200)=0x7fffffff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r4 = gettid() getpgrp(r4) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='\x00') 00:18:38 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 363.584665][ T9793] IPVS: ftp: loaded support on port[0] = 21 [ 364.163928][ T9805] IPVS: ftp: loaded support on port[0] = 21 [ 364.782559][ T21] device bridge_slave_1 left promiscuous mode [ 364.793431][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.843696][ T21] device bridge_slave_0 left promiscuous mode [ 364.851065][ T21] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.906901][ T21] device veth1_macvtap left promiscuous mode [ 364.923242][ T21] device veth0_macvtap left promiscuous mode [ 364.942616][ T21] device veth1_vlan left promiscuous mode [ 364.959672][ T21] device veth0_vlan left promiscuous mode [ 366.153868][ T0] NOHZ: local_softirq_pending 08 [ 366.243431][ T21] device hsr_slave_0 left promiscuous mode [ 366.303333][ T21] device hsr_slave_1 left promiscuous mode [ 366.356921][ T21] team0 (unregistering): Port device team_slave_1 removed [ 366.367922][ T21] team0 (unregistering): Port device team_slave_0 removed [ 366.379035][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 366.437883][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 366.523646][ T21] bond0 (unregistering): Released all slaves [ 366.628901][ T9820] IPVS: ftp: loaded support on port[0] = 21 [ 366.747646][ T9820] chnl_net:caif_netlink_parms(): no params data found [ 366.822968][ T9820] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.833073][ T9820] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.841274][ T9820] device bridge_slave_0 entered promiscuous mode [ 366.853506][ T9820] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.860576][ T9820] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.871566][ T9820] device bridge_slave_1 entered promiscuous mode [ 366.905804][ T9820] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 366.918296][ T9820] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 366.949906][ T9820] team0: Port device team_slave_0 added [ 366.958281][ T9820] team0: Port device team_slave_1 added [ 366.975303][ T9820] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 366.982402][ T9820] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 367.009352][ T9820] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 367.022705][ T9820] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 367.030186][ T9820] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 367.056739][ T9820] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 367.125657][ T9820] device hsr_slave_0 entered promiscuous mode [ 367.173587][ T9820] device hsr_slave_1 entered promiscuous mode [ 367.223944][ T9820] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 367.231512][ T9820] Cannot create hsr debugfs directory [ 367.282580][ T9820] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.289685][ T9820] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.297124][ T9820] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.304162][ T9820] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.380828][ T9820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 367.400497][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 367.425663][ T3643] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.457215][ T3643] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.475960][ T9820] 8021q: adding VLAN 0 to HW filter on device team0 [ 367.489702][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 367.502017][ T3643] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.509094][ T3643] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.532106][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 367.544929][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.551981][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.577360][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 367.600914][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 367.609618][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 367.622383][ T9826] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 367.646573][ T9820] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 367.677366][ T9820] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 367.692339][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 367.730483][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 367.741045][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 367.758430][ T9820] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 367.841728][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 367.851710][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 367.875934][ T21] tipc: TX() has been purged, node left! [ 367.887946][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 367.899367][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 367.911679][ T9820] device veth0_vlan entered promiscuous mode [ 367.922257][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 367.931685][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 367.950648][ T9820] device veth1_vlan entered promiscuous mode [ 367.978215][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 367.987710][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 367.996279][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 368.004985][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 368.016781][ T9820] device veth0_macvtap entered promiscuous mode [ 368.031359][ T9820] device veth1_macvtap entered promiscuous mode [ 368.050705][ T9820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.061740][ T9820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.072034][ T9820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.083015][ T9820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.093331][ T9820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.104124][ T9820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.114721][ T9820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 368.125625][ T9820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.137829][ T9820] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 368.148140][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 368.157713][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 368.165902][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 368.174953][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 368.186631][ T9820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.197608][ T9820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.208945][ T9820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.221422][ T9820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.232543][ T9820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.246249][ T9820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.256814][ T9820] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 368.270739][ T9820] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 368.282403][ T9820] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 368.295947][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 368.308097][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 368.696961][ T9853] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 368.719453][ T9853] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 368.736246][ T9853] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 368.763707][ T9853] batman_adv: batadv0: Removing interface: batadv_slave_1 00:18:44 executing program 3: write$FUSE_NOTIFY_POLL(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x41395527) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f0000000340), 0x41395527) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r7 = accept(0xffffffffffffffff, 0x0, 0x0) getpeername$l2tp6(r7, &(0x7f0000005000), &(0x7f0000005040)=0x20) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00') sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r5, r6, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 00:18:44 executing program 1: openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000200)={0x9, 0x80000000008d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x1, 0x10000, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x38, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x40) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16, @ANYBLOB="100225bd7000fbdbdf2508000000050030000000001105465130f23b1375750749a750cd77ae6a9c0885a7"], 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x50) close(0xffffffffffffffff) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f0, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x89f2, &(0x7f0000000080)={'ip_vti0\x00', @ifru_flags}) socket$kcm(0x10, 0x2, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 00:18:44 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='clear_refs\x00') r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='stat\x00') sendfile(r2, r3, 0x0, 0x1) 00:18:44 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00') sendto$llc(r1, &(0x7f0000000040)="fab25aee0a763784b3c444dfba781680cf9e51c62f6ad63bab464a69174a29f835b59c02739a84026e5b1ba6d95af71b684920", 0x33, 0x10, &(0x7f0000000080)={0x1a, 0x1b, 0x7, 0x1, 0x1, 0x4, @remote}, 0x10) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:44 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:45 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) [ 369.557420][ T9857] overlayfs: conflicting lowerdir path 00:18:45 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:45 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000200)='team\x00') r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x9, 0x80) bind$bt_l2cap(r0, &(0x7f00000001c0)={0x1f, 0x2, @fixed={[], 0x10}, 0x7, 0x2}, 0xe) r2 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_EDID(r4, 0xc0285628, &(0x7f0000000080)={0x0, 0x0, 0xeecc, [], &(0x7f0000000040)=0x5}) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) r6 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) r9 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$DRM_IOCTL_AGP_FREE(r11, 0x40206435, &(0x7f00000004c0)={0x3ff, 0x0, 0x10000, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r12 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) r14 = socket$inet(0x2, 0x3, 0x6) connect$inet(r14, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) getsockopt$inet_pktinfo(r14, 0x0, 0xd, &(0x7f0000000b40)={0x0, @rand_addr, @local}, &(0x7f0000000b80)=0xc) r15 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') sendmsg$NL80211_CMD_REQ_SET_REG(r13, &(0x7f0000000480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f0000000340)={0xe8, r15, 0x8, 0x70bd2d, 0x25dfdbfb, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x1}, @NL80211_ATTR_REG_RULES={0x3c, 0x22, 0x0, 0x1, [@NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x9}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x9}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x3f}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x5}, @NL80211_ATTR_DFS_CAC_TIME={0x8}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x81}]}, @NL80211_ATTR_REG_RULES={0x34, 0x22, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x7fffffff}, @NL80211_ATTR_REG_RULE_FLAGS={0x8, 0x1, 0x4}, @NL80211_ATTR_REG_RULE_FLAGS={0x8}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x40}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0x6}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x42}]}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x20}, @NL80211_ATTR_REG_RULES={0x44, 0x22, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x7fffffff}, @NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x858d1e7c}, @NL80211_ATTR_REG_RULE_FLAGS={0x8}, @NL80211_ATTR_DFS_CAC_TIME={0x8, 0x7, 0x2}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x4}, @NL80211_ATTR_FREQ_RANGE_MAX_BW={0x8, 0x4, 0xa}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x81}, @NL80211_ATTR_FREQ_RANGE_START={0x8, 0x2, 0x834}]}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x20003}, @NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_SOCKET_OWNER={0x4}]}, 0xe8}}, 0x8081) r16 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000180)='ethtool\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r17, 0x0, r16) ioctl$FIDEDUPERANGE(r5, 0xc0189436, &(0x7f0000000280)=ANY=[@ANYBLOB="0080000000000000ff000000000000000300000000000000", @ANYRES32=r8, @ANYBLOB="0000000060f3e80500"/28, @ANYRES32=r1, @ANYBLOB="000000000001000000000000000040000000000000000000000000006539768f1ebdf1791fb46bb07ecc9e5ad5283d850e6e71123f72b15704844ac7868e5e21cce134dc0f459d30289f5237491f5109d76d700134", @ANYRES32=r17, @ANYBLOB='\x00\x00\x00\x00\b\x00'/28]) [ 369.916781][ T9876] overlayfs: conflicting lowerdir path 00:18:45 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:45 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r1, 0xc0a85322, &(0x7f0000000000)) [ 370.253708][ T9883] overlayfs: conflicting lowerdir path [ 370.383278][ T21] tipc: TX() has been purged, node left! 00:18:46 executing program 1: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000040)={0x8, 0x3, 0x4, 0x70000, 0x3ff, {}, {0x5, 0x8, 0x3, 0x0, 0x0, 0x1b, "1100"}, 0x40, 0x3, @fd, 0x9, 0x0, 0xffffffffffffffff}) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) r1 = msgget$private(0x0, 0x400) msgrcv(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xef, 0x3, 0x1000) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vga_arbiter\x00', 0x280082, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) sendmsg$IPVS_CMD_SET_CONFIG(r2, 0x0, 0x800) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xf17) unshare(0x40040400) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x80000, 0x4) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200), 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) gettid() r4 = getpgrp(0x0) sched_rr_get_interval(r4, &(0x7f0000000240)) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='\x00') 00:18:46 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x29, 0x5, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, 0x0) 00:18:46 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000011000/0x18000)=nil, &(0x7f00000008c0)=[@text32={0x20, &(0x7f00000000c0)="b805000000b9510000000f01c10f46a78900000066ba2100b067ee66ba4100edb9800000c00f3266ba400066ed0f30c4c271de9d0000000066b808008ed0660f38806f000f011c2666b8bf008ee0", 0x4e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_CREATE_PIT2(r1, 0x4040ae77, &(0x7f0000000000)) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000001c0)={[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}]}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4cb]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:18:46 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMCLONE(r6, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000000140)={0x1, 0xa5, "0e2f7626b73da85bed810408c323cd544757bb81c5d83ec664e28218bd8f5625d972697423291ca4614a8fe1fbefb8745a0c87afa77228b1a188a0273c42b2f54e68c16fbf03b50465963396cf25e4eb9a4927ad9d6215bae7c25afff1110c8cc20191743b81e8391cb7ec31225de8554dbb4cdc535bc07f09ade8657e198efc839d588465c6ee3d8132b45a2057f599d11ba1a31189ff3daa92b16dd8729c58c6da734fd3"}) getsockopt$bt_l2cap_L2CAP_OPTIONS(r7, 0x6, 0x1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:46 executing program 2: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000040)={0x8, 0x3, 0x4, 0x70000, 0x3ff, {}, {0x5, 0x8, 0x3, 0x0, 0x0, 0x1b, "1100"}, 0x40, 0x3, @fd, 0x9, 0x0, 0xffffffffffffffff}) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) r1 = msgget$private(0x0, 0x400) msgrcv(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xef, 0x3, 0x1000) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vga_arbiter\x00', 0x280082, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r2, 0x0, 0x800) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xf17) unshare(0x40040400) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x80000, 0x4) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200)=0x7fffffff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r4 = gettid() getpgrp(r4) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='\x00') 00:18:46 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 371.350545][ T9898] pit: kvm: requested 13409 ns i8254 timer period limited to 200000 ns [ 371.384497][ T9898] pit: kvm: requested 93866 ns i8254 timer period limited to 200000 ns [ 371.399359][ T21] device bridge_slave_1 left promiscuous mode [ 371.423198][ T21] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.432445][ T9898] pit: kvm: requested 172647 ns i8254 timer period limited to 200000 ns [ 371.467539][ T9898] pit: kvm: requested 162590 ns i8254 timer period limited to 200000 ns [ 371.494907][ T21] device bridge_slave_0 left promiscuous mode [ 371.503474][ T21] bridge0: port 1(bridge_slave_0) entered disabled state 00:18:47 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x3) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000000)) 00:18:47 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 371.514149][ T9909] IPVS: ftp: loaded support on port[0] = 21 [ 371.520643][ T9919] IPVS: ftp: loaded support on port[0] = 21 [ 371.580053][ T21] device veth1_macvtap left promiscuous mode [ 371.646004][ T21] device veth0_macvtap left promiscuous mode [ 371.663420][ T21] device veth1_vlan left promiscuous mode [ 371.682209][ T21] device veth0_vlan left promiscuous mode [ 371.872036][ T9936] overlayfs: conflicting lowerdir path 00:18:47 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:47 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r8, 0x84, 0x20, &(0x7f0000001700), &(0x7f0000001740)=0x4) fcntl$dupfd(r5, 0x0, r1) preadv(r2, &(0x7f0000001480)=[{&(0x7f0000000000)=""/38, 0x26}, {&(0x7f0000000040)=""/119, 0x77}, {&(0x7f00000000c0)=""/91, 0x5b}, {&(0x7f0000001380)=""/41, 0x29}, {&(0x7f0000001540)=""/150, 0x96}, {&(0x7f0000000280)=""/4096, 0x1000}, {&(0x7f0000001280)=""/83, 0x53}, {&(0x7f0000001300)=""/128, 0x80}, {&(0x7f0000001380)}], 0x9, 0x1) r9 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0xffffffffffffffff, 0x9}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) eventfd2(0x80000000, 0x1) r14 = fcntl$dupfd(r13, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f00000001c0)=0xc) setuid(r15) statx(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x400, 0xfff, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r14, &(0x7f00000013c0)={0xa0, 0x0, 0x7, {{0x0, 0x1, 0x8, 0x5, 0x100, 0x401, {0x3, 0x9, 0x4663, 0x0, 0x1dc, 0x3, 0x2, 0x0, 0x10000, 0x80000001, 0x9, r15, r16, 0xfff, 0x9}}, {0x0, 0xa}}}, 0xa0) r17 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) ioctl$ASHMEM_PURGE_ALL_CACHES(r17, 0x770a, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) [ 372.087366][ T9945] IPVS: ftp: loaded support on port[0] = 21 00:18:47 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 372.352638][ T9958] overlayfs: conflicting lowerdir path 00:18:48 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 372.517921][ T9961] overlayfs: conflicting lowerdir path [ 372.553816][ T0] NOHZ: local_softirq_pending 08 [ 373.593571][ T21] device hsr_slave_0 left promiscuous mode [ 373.634179][ T21] device hsr_slave_1 left promiscuous mode [ 373.694431][ T21] team0 (unregistering): Port device team_slave_1 removed [ 373.705009][ T21] team0 (unregistering): Port device team_slave_0 removed [ 373.715385][ T21] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 373.747270][ T21] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 373.824389][ T21] bond0 (unregistering): Released all slaves [ 374.091714][ T9968] IPVS: ftp: loaded support on port[0] = 21 [ 374.290464][ T9968] chnl_net:caif_netlink_parms(): no params data found [ 374.391659][ T9968] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.405373][ T9968] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.418654][ T9968] device bridge_slave_0 entered promiscuous mode [ 374.434666][ T9968] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.441853][ T9968] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.453940][ T9968] device bridge_slave_1 entered promiscuous mode [ 374.481102][ T9968] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 374.506401][ T9968] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 374.528168][ T9968] team0: Port device team_slave_0 added [ 374.545928][ T9968] team0: Port device team_slave_1 added [ 374.563333][ T9968] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 374.570481][ T9968] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 374.653208][ T9968] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 374.698113][ T9968] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 374.718903][ T9968] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 374.778282][ T9968] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 374.878724][ T9968] device hsr_slave_0 entered promiscuous mode [ 374.943479][ T9968] device hsr_slave_1 entered promiscuous mode [ 374.993643][ T9968] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 375.001244][ T9968] Cannot create hsr debugfs directory [ 375.116823][ T9968] 8021q: adding VLAN 0 to HW filter on device bond0 [ 375.165401][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 375.173101][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 375.184597][ T9968] 8021q: adding VLAN 0 to HW filter on device team0 [ 375.195288][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 375.204737][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 375.213371][ T7943] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.220401][ T7943] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.228932][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 375.253995][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 375.262485][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 375.271574][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.278684][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.286837][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 375.303319][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 375.312339][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 375.321052][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 375.339720][ T9968] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 375.350463][ T9968] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 375.362626][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 375.371337][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 375.379649][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 375.389096][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 375.397543][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 375.406058][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 375.414297][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 375.433272][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 375.450482][ T9968] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 375.458364][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 375.467315][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 375.533590][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 375.542268][ T3104] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 375.561375][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 375.572529][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready 00:18:51 executing program 1: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000040)={0x8, 0x3, 0x4, 0x70000, 0x3ff, {}, {0x5, 0x8, 0x3, 0x0, 0x0, 0x1b, "1100"}, 0x40, 0x3, @fd, 0x9, 0x0, 0xffffffffffffffff}) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) r1 = msgget$private(0x0, 0x400) msgrcv(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xef, 0x3, 0x1000) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vga_arbiter\x00', 0x280082, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, &(0x7f0000000140)={'syzkaller1\x00', {0x7, 0x0, @remote}}) sendmsg$IPVS_CMD_SET_CONFIG(r2, 0x0, 0x800) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xf17) unshare(0x40040400) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x80000, 0x4) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200), 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) gettid() r4 = getpgrp(0x0) sched_rr_get_interval(r4, &(0x7f0000000240)) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='\x00') [ 375.581704][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 375.603777][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 375.621710][ T9968] device veth0_vlan entered promiscuous mode [ 375.669454][ T9968] device veth1_vlan entered promiscuous mode [ 375.702496][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 375.711562][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 375.719821][ T3643] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 375.731269][ T9968] device veth0_macvtap entered promiscuous mode [ 375.744048][ T9968] device veth1_macvtap entered promiscuous mode [ 375.769741][ T9968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 375.782983][ T9968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 375.796337][ T9968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 375.807311][ T9968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 375.807777][ T9985] IPVS: ftp: loaded support on port[0] = 21 [ 375.817418][ T9968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 375.839022][ T9968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 375.849237][ T9968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 375.862330][ T9968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 375.873487][ T9968] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 375.889311][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 375.897979][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 375.906861][ T7943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 375.929956][ T9968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 375.940452][ T9968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 375.950696][ T9968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 375.961158][ T9968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 375.971159][ T9968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 375.981939][ T9968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 375.992083][ T9968] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 376.002553][ T9968] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 376.014148][ T9968] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 376.024304][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 376.033378][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready 00:18:51 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$read(0xb, r2, &(0x7f0000000000)=""/4, 0x31852a384220a633) 00:18:51 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:51 executing program 5: socket(0x40000000015, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) syz_open_procfs(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/bus/input/handlers\x00', 0x0, 0x0) socket(0x11, 0x800000003, 0x0) r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000009a00)) sendmmsg(0xffffffffffffffff, &(0x7f000000af00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000009a00)}}, {{0x0, 0x0, &(0x7f0000009cc0)}}, {{0x0, 0x0, &(0x7f000000adc0)=[{&(0x7f0000009dc0)}], 0x1}}], 0x5, 0x0) semget(0x1, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x127c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76006e) 00:18:51 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000180)={{0x1b, 0x5d, 0x32, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000040)={0x3, 0x94, "cd2d72e9b98faa770f49781ce16627a20f572b15ec0e29dc395b2f222857c61af247f1981b8dc1d0f86f9aea015ec21cedbd112627ddb79e2ce660d3527231e8de38c63c5614ab975f604893bf27e26c288a6b25cee2b879ba5726625bd043ae27dc4264295b033e3f7dc3aa118138275a99dd1b4b14e8195e079df4954d4342c764a716dc3b007b348bd8adf0a4be30889a3ba6"}) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r2 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200)='nl80211\x00') sendmsg$NL80211_CMD_SET_WIPHY(r7, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x48, r8, 0x8, 0x70bd28, 0x25dfdbfb, {}, [@NL80211_ATTR_WIPHY_RTS_THRESHOLD={0x8, 0x40, 0x1000}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x4}, @NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, 0x4}, @NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x20}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1aea349a}}, @NL80211_ATTR_WIPHY_TX_POWER_LEVEL={0x8, 0x62, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x40060}, 0x0) r9 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$UFFDIO_REGISTER(r11, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x3}) 00:18:51 executing program 2: ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000040)={0x8, 0x3, 0x4, 0x70000, 0x3ff, {}, {0x5, 0x8, 0x3, 0x0, 0x0, 0x1b, "1100"}, 0x40, 0x3, @fd, 0x9, 0x0, 0xffffffffffffffff}) ioctl$sock_x25_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={@remote={[], 0x0}, 0x3, 'macvlan1\x00'}) r1 = msgget$private(0x0, 0x400) msgrcv(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0xef, 0x3, 0x1000) socket$nl_route(0x10, 0x3, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000780)='/dev/vga_arbiter\x00', 0x280082, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8914, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(r2, 0x0, 0x800) mount$fuse(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xf17) unshare(0x40040400) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$inet(0x2, 0x80000, 0x4) setsockopt$inet_sctp6_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200)=0x7fffffff, 0x4) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) write$P9_RWSTAT(0xffffffffffffffff, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) dup(0xffffffffffffffff) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x0, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r4 = gettid() getpgrp(r4) ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f00000000c0)='\x00') [ 376.303200][T10020] overlayfs: conflicting lowerdir path [ 376.320951][T10019] ubi0: attaching mtd0 [ 376.341375][T10019] ubi0: scanning is finished [ 376.343630][T10026] dns_resolver: Unsupported server list version (0) 00:18:51 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U+', 0x100000000}, 0x16, 0x3) 00:18:52 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 376.375300][T10026] dns_resolver: Unsupported server list version (0) [ 376.432251][T10022] IPVS: ftp: loaded support on port[0] = 21 [ 376.452088][T10019] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 376.475142][T10019] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes 00:18:52 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_ACCEPT(r0, &(0x7f00000002c0)={0x8, 0x120, 0xfa00, {0x0, {0x0, 0x0, "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"}}}, 0x128) [ 376.506702][T10019] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 00:18:52 executing program 1: r0 = io_uring_setup(0x14a, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f00000000c0)=[0xffffffffffffffff], 0x1) shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffffff) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f00000016c0)={0x0, &(0x7f0000000140)=[0xffffffffffffffff]}, 0x1) [ 376.576433][T10019] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 376.625750][T10019] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 376.654001][T10019] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 376.673010][T10040] overlayfs: failed to resolve './file1': -2 00:18:52 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x800) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @local}}, 0x0, 0xfff, 0xf, 0x3ff, 0x2c, 0xc0b, 0x9}, &(0x7f0000000180)=0x9c) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) dup2(r3, r4) r5 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000400)=ANY=[@ANYRES32=r6, @ANYBLOB="00000004"], 0x0) r7 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r9, 0x84, 0x1f, &(0x7f00000000c0)={r6, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0xf850}, &(0x7f0000000000)=0x90) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000280)={r2, 0x29d, 0x80, 0x100, 0x4, 0x7ff, 0x3000, 0xb9, {r6, @in={{0x2, 0x4e22, @loopback}}, 0x80000000, 0x9, 0xfff, 0xfffffffe, 0x1}}, &(0x7f00000001c0)=0xb0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v1={0x1000000, [{0x37fb, 0x8}]}, 0xc, 0x0) ioctl$sock_ifreq(0xffffffffffffffff, 0x894c, &(0x7f0000000200)={'wg1\x00', @ifru_addrs=@generic={0x8, "a2e27e2d6a7436c3283baf7fa49f"}}) [ 376.696385][T10019] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 3917670783 00:18:52 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000002c0)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2909}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, r1, 0x0) r2 = creat(&(0x7f0000000380)='./bus\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000004c0)={0x0, 0x0, 0x1c7d9, 0x0, [], [{}, {0x801, 0x0, 0x80000001}]}) socket(0xa, 0x1, 0x0) close(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0}, 0x0) connect$can_bcm(r2, &(0x7f0000000040)={0x1d, r3}, 0x10) memfd_create(0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000003c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000b40)=ANY=[@ANYBLOB="2800000004000000000000000000000000000080000000000000962c2825ea4c00000000000000"], 0x27) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000240)) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) [ 376.736671][T10019] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 [ 376.753244][ T7] tipc: TX() has been purged, node left! [ 376.768147][T10030] ubi0: background thread "ubi_bgt0d" started, PID 10030 00:18:52 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:52 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0xb, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcsa\x00', 0x2080, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f00000001c0)={0x101, "c723ab48b545cbabaa7df06b403011e3030d3e8588bb3ddc65b5d45fa1aa0232", 0x1, 0x0, 0x1, 0x7, 0x1000000, 0x2}) getsockopt$bt_BT_POWER(r1, 0x112, 0x8, 0x0, &(0x7f0000000180)) r5 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_G_EXT_CTRLS(r7, 0xc0205647, &(0x7f0000000080)={0x990000, 0xfffffffb, 0x0, r0, 0x0, &(0x7f0000000040)={0x2004d, 0x800, [], @p_u32=&(0x7f0000000000)=0x3}}) openat(r8, &(0x7f00000000c0)='./file0\x00', 0x100, 0x0) [ 376.846144][T10019] ubi: mtd0 is already attached to ubi0 00:18:52 executing program 5: socket(0x40000000015, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) syz_open_procfs(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/bus/input/handlers\x00', 0x0, 0x0) socket(0x11, 0x800000003, 0x0) r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000009a00)) sendmmsg(0xffffffffffffffff, &(0x7f000000af00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000009a00)}}, {{0x0, 0x0, &(0x7f0000009cc0)}}, {{0x0, 0x0, &(0x7f000000adc0)=[{&(0x7f0000009dc0)}], 0x1}}], 0x5, 0x0) semget(0x1, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x127c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76006e) [ 377.013401][T10068] overlayfs: failed to resolve './file1': -2 00:18:52 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:52 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='hybla\x00', 0x6) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000200), 0xfffffffffffffeb4, 0x20008011, &(0x7f0000db4ff0)={0x2, 0x4e20, @loopback=0xac14140d}, 0x10) recvfrom(r0, &(0x7f0000f9cf9b)=""/101, 0x6478c8501c739e53, 0x0, 0x0, 0x4f) 00:18:52 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x61, 0x11, 0x6c}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 00:18:52 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) [ 377.170098][T10072] ubi: mtd0 is already attached to ubi0 [ 377.252077][T10080] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 377.291489][T10078] overlayfs: failed to resolve './file1': -2 00:18:52 executing program 5: socket(0x40000000015, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) syz_open_procfs(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/bus/input/handlers\x00', 0x0, 0x0) socket(0x11, 0x800000003, 0x0) r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000009a00)) sendmmsg(0xffffffffffffffff, &(0x7f000000af00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000009a00)}}, {{0x0, 0x0, &(0x7f0000009cc0)}}, {{0x0, 0x0, &(0x7f000000adc0)=[{&(0x7f0000009dc0)}], 0x1}}], 0x5, 0x0) semget(0x1, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x127c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76006e) 00:18:53 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x280, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="28000000ecffffff00b473ff", @ANYRES32=r3, @ANYBLOB="000000000000000008000a000f000000"], 0x28}}, 0x0) sendmsg$can_raw(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x1d, r3}, 0x10, &(0x7f00000000c0)={&(0x7f0000000080)=@can={{0x0, 0x0, 0x1}, 0x8, 0x1, 0x0, 0x0, "bc69269b24a489c5"}, 0x10}, 0x1, 0x0, 0x0, 0x20000080}, 0x4) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r4, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:53 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:53 executing program 2: r0 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r0, 0x1000008912, &(0x7f0000000040)="080db5055e0bcfe8479071") r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000580)={'veth0_to_bond\x00', 0x0}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x100, 0x4) bind$packet(r1, &(0x7f0000000080)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @dev}, 0x14) socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, 0x0, 0x0) r3 = socket(0x0, 0x803, 0x0) getsockname$packet(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) socket(0x0, 0x0, 0x0) sendmmsg$alg(0xffffffffffffffff, &(0x7f0000000140), 0x4924924924925a4, 0x0) write(r1, &(0x7f0000000040)="bd38832aa0da3ed709249f2c8e21", 0xca) recvmmsg(r1, &(0x7f0000001b00)=[{{0x0, 0x0, 0x0}}], 0x1a8, 0x2040, 0x0) 00:18:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f00007e0000)=""/4, &(0x7f0000000000)=0x4) 00:18:53 executing program 0: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) setitimer(0x0, &(0x7f0000000040)={{r0, r1/1000+10000}, {0x0, 0x7530}}, &(0x7f0000000080)) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r2, 0x112, 0x8, 0x0, &(0x7f0000000240)) syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f00000000c0)=""/93) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x600800, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f00000001c0), &(0x7f0000000200)=0x14) [ 377.680647][T10093] ubi: mtd0 is already attached to ubi0 00:18:53 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:53 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup2(r4, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=@newtfilter={0x84, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0xfff1}}, [@filter_kind_options=@f_bpf={{0x8, 0x1, 'bpf\x00'}, {0x58, 0x2, [@TCA_BPF_OPS={{0x6, 0x4, 0x1}, {0xc, 0x5, [{0x6}]}}, @TCA_BPF_POLICE={0x40, 0x2, [@TCA_POLICE_TBF={0x3c}]}]}}]}, 0x84}}, 0x0) 00:18:53 executing program 5: socket(0x40000000015, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) syz_open_procfs(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/bus/input/handlers\x00', 0x0, 0x0) socket(0x11, 0x800000003, 0x0) r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f0000009a00)) sendmmsg(0xffffffffffffffff, &(0x7f000000af00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000009a00)}}, {{0x0, 0x0, &(0x7f0000009cc0)}}, {{0x0, 0x0, &(0x7f000000adc0)=[{&(0x7f0000009dc0)}], 0x1}}], 0x5, 0x0) semget(0x1, 0x0, 0x0) getsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x40046f41, 0x76006e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x127c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x40186f40, 0x76006e) 00:18:53 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x5, 0x0) ioctl$TCXONC(r2, 0x540a, 0x0) write$binfmt_elf32(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="7f"], 0x1) write(r2, 0x0, 0x0) dup2(r0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000016) 00:18:53 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) ioctl$SNDRV_PCM_IOCTL_SW_PARAMS(0xffffffffffffffff, 0xc0884113, &(0x7f0000000000)={0x0, 0xfffffff7, 0x0, 0x0, 0xfffffffffffffffe, 0x1ff, 0xf93, 0x1000, 0x40, 0x7, 0x8, 0x4}) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$UI_GET_SYSNAME(r3, 0x8040552c, &(0x7f00000000c0)) 00:18:53 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:53 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) write$ppp(0xffffffffffffffff, &(0x7f0000000300)="5cfd7ba627da4da650ab269d10cb57d140291d9af5eeeb27977de5e86c2f1c1315460d476cdc955dacf5622af21d41aec2a147d4db96675f5c382a1a6736caa0d0662522c798a38d843998e4897c2735c71568952aa955568fe01138401b67b9e7a4ee55ecf958", 0x67) ftruncate(0xffffffffffffffff, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) unshare(0x20600) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 378.093367][T10116] ubi: mtd0 is already attached to ubi0 00:18:53 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x0) write$ppp(0xffffffffffffffff, &(0x7f0000000300)="5cfd7ba627da4da650ab269d10cb57d140291d9af5eeeb27977de5e86c2f1c1315460d476cdc955dacf5622af21d41aec2a147d4db96675f5c382a1a6736caa0d0662522c798a38d843998e4897c2735c71568952aa955568fe01138401b67b9e7a4ee55ecf958", 0x67) ftruncate(0xffffffffffffffff, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) unshare(0x20600) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 00:18:53 executing program 3: syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=ANY=[@ANYBLOB="666f7263652c756d61736b3d30303030303030303030303030303030303030323030302c747970653d102fa280bd"]) 00:18:53 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setsockopt$packet_buf(r3, 0x107, 0x16, &(0x7f0000000080)="7e52520e73ccbc250579ccd0b9916741b9c8db62d2959678ac19aebecf1cd14b1d91461cd99047896a3e1395e49605d0b341", 0x32) ioctl$TIOCEXCL(r3, 0x540c) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x800, 0x0) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r5, &(0x7f0000000180)={{0x1b, 0x5d, 0x32, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r5, 0xc0506617, &(0x7f0000000280)={{0x3, 0x0, @descriptor="a39a7d550ee62138"}, 0xf8, [], "4c5685e958aee8cd10b75ccbfd9718bf28b2e146b41fef9fd88563014183293478c6bf452f013b9971a06f5322245437f23bc98fd9fcfd06ea5d91137f8da98889eefedfb1e0c0759bb75f57d534c52b9934e137502ec6c87f0bf65db7d3e7fb48653022dad2f93ed87cd27a19422f23845c54c456971e39f3de58ec5df63765d2a43bd99ec8b36057103e1ef75742deddd316d425a8d6b2b8e806e41315ec6192ee38fa142dc8d72c5b3b1690992f87b9e97cd284b314412ac5506266187da6e3fa9df18ef8b429643c3ee47ed1cc09c0125402eb0dd7f146240b7fb940193a40514911ba48f969bcc169750099202a835f014847d66edc"}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="4c000000030101010000000000000000050000003800048034000180060005000908000005000100070000000500010008000000050002000000000006000400044000000500011c08000000"], 0x4c}, 0x1, 0x0, 0x0, 0x50}, 0x40000) 00:18:53 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:54 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x418280, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) [ 378.473044][T10145] hfsplus: type requires a 4 character value 00:18:54 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x40000, 0x0) sendto$rxrpc(r1, &(0x7f0000000040)="f389223acd4ab18ac3f963f89934318ec3be0d8e38fc384906114e7c792ccfd92772bbe5477882c11f3898fad2268dec59d34ff276d96a52b13ebe42525563c05949db", 0x43, 0x40800, &(0x7f00000000c0)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x24) 00:18:54 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000080)=0x4) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f00000000c0)={r3, 0x1}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$bt_BT_POWER(r2, 0x112, 0x8, 0x0, &(0x7f0000000240)) [ 378.556266][T10145] hfsplus: unable to parse mount options [ 378.657590][T10145] hfsplus: type requires a 4 character value [ 378.665913][T10145] hfsplus: unable to parse mount options 00:18:54 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)}, 0x12120) 00:18:54 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="aaf20000e746b85cb01e92550250a490cff4300ad49be094008090bcf7bdf5a4d0dacee21d438be196e80742259eb3a1ac7e004b94f9b7ab4baa81cf128f5f61a199ab7c2badfb67c00ca013e15c05fb9a13f9557e4a9191f6c477a723c6fc1f10aca3e062d95598fbf27d12a60451f0e13ceed34dda1a105b18d79383f0ef5237116d32d45ead01d0cb6ad41f7185ad664506ae44b9c79abba5de97372bd4a87357cd6c895780dcebe38410add118"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400fbc7000000000000000200000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020898dde66057433b6ef3a41d22be22500000000000000100000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae798a6c96d039be1faccc1a4ed9a1c4ae745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bf"], 0x84}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 00:18:54 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000600)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4}, 0x48) 00:18:54 executing program 2: unshare(0x40000000) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) 00:18:54 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f00007e0000)=""/4, &(0x7f0000000000)=0x4) 00:18:54 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:54 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 379.197293][T10186] IPVS: ftp: loaded support on port[0] = 21 00:18:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='autofs\x00', 0x0, &(0x7f0000000340)='bpf\x00') 00:18:54 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t~-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') [ 379.243540][ T7] tipc: TX() has been purged, node left! 00:18:54 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20400, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000040)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x8, 0x0, &(0x7f0000000240)) [ 379.360917][T10186] IPVS: ftp: loaded support on port[0] = 21 00:18:55 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 379.426131][T10197] autofs4:pid:10197:autofs_fill_super: called with bogus options 00:18:55 executing program 1: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) close(0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:18:55 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r2, 0x0, r1) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000280)={0x0, 0x0, 0x9, 0x0, [], [{0x6f7a, 0x3c, 0x0, 0x6, 0x8001, 0x5}, {0xfe, 0x80000001, 0x8000, 0x7, 0x55f}], [[], [], [], [], [], [], [], [], []]}) 00:18:55 executing program 3: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff0500020200000000100f0007e1000c080017001605ac", 0x23) close(r2) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x10000017e) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 00:18:55 executing program 2: unshare(0x40000000) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) [ 379.668746][T10210] overlayfs: conflicting lowerdir path 00:18:55 executing program 5: unshare(0x40000000) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) 00:18:55 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_GET_VRING_ENDIAN(r4, 0x4008af14, &(0x7f0000000040)={0x1, 0xffffffff}) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:55 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 379.801114][T10226] IPVS: ftp: loaded support on port[0] = 21 00:18:55 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @local}, 0x1c) write$binfmt_misc(r0, 0x0, 0x0) 00:18:55 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x401, 0x20280) ioctl$KDGKBMODE(r1, 0x4b44, &(0x7f0000000040)) [ 379.975780][T10235] IPVS: ftp: loaded support on port[0] = 21 00:18:55 executing program 1: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0) 00:18:55 executing program 2: unshare(0x40000000) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) [ 380.149038][T10241] overlayfs: conflicting lowerdir path 00:18:55 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f0000000040)=@un=@abs, &(0x7f00000000c0)=0x80, 0x0) ioctl$SIOCX25CALLACCPTAPPRV(r0, 0x89e8) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:55 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:55 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) dup(0xffffffffffffffff) [ 380.275884][T10251] IPVS: ftp: loaded support on port[0] = 21 [ 380.465379][T10262] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 380.519117][ T27] audit: type=1804 audit(1582157936.093:46): pid=10262 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir663187942/syzkaller.qjUFd6/46/file0/bus" dev="loop5" ino=46 res=1 00:18:56 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x177, 0x4) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c) recvmmsg(r0, &(0x7f0000f61000), 0x3ffffffffffff07, 0x2040, 0x0) 00:18:56 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) socketpair(0x1d, 0x3, 0x81, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_SET(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)={0x20, r2, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x14c, r2, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x10000}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x6}, @TIPC_NLA_PUBL_UPPER={0x1, 0x3, 0x6}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xfffffc00}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x2}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xec09}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3e36}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfe00}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}]}, @TIPC_NLA_NODE={0x1c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x49}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x10001}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x101}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_SOCK={0x78, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x401}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x20}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9f85}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x800}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x14c}, 0x1, 0x0, 0x0, 0x4000000}, 0x400c045) bind$ax25(r1, &(0x7f0000000040)={{0x3, @bcast}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:56 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000000)) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) ioctl$VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, &(0x7f0000000040)={0x1, 0x7, 0x4, 0x2000, 0x2, {}, {0x5, 0x8, 0x1, 0x71, 0x1f, 0xe4, "967532ae"}, 0xfff, 0x3, @offset=0x5, 0x6a, 0x0, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) dup2(r2, r3) r4 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000400)=ANY=[@ANYRES32=r5, @ANYBLOB="00000004"], 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f00000000c0)={r5, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0xf850}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000000c0)={0x633, 0x5, 0x8000, 0x2, 0xd7, 0x100, 0x8d0, 0x0, r5}, 0x20) 00:18:56 executing program 2: unshare(0x40000000) r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) 00:18:56 executing program 3: socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x8000000, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55", 0x7, 0x14, 0x0, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) r2 = socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r3, &(0x7f0000000500), 0x37d, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0x400d3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000180)) sendto$packet(r1, 0x0, 0x0, 0x8000000, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55fc92f0c5aa88", 0xd, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$nl_route_sched(r4, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4011, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000000000000da98866e0409e920c35000de290b1736b4a1a5d30b00000000000020000000001c000000006f07c3ef859207518476bb5fb0954580d736ba292fbfb8790854f373443941c00e47d1bb183487b22d3a4463dfc4a412597bd3a18edba9ebf1f29601f5ff945f71811424d744047d52febc4607ef39e4a3e04c06aaf402c602b8b259c60e5406687b0bf2dff89b58005127b333ca194ce8cd1c0ac73b6ea45ecfb718125d90288ef01ec4939bd904cc9d414cba0e09b5d3385204da4bab1ebd0c199a5eab10955885c985e78ac0da6872a69439d702a3433fda40f24726653b"], 0x88) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:18:56 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) renameat2(r3, &(0x7f0000000000)='./file0\x00', r6, &(0x7f0000000040)='./file0\x00', 0x5) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:56 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 380.923753][T10285] IPVS: ftp: loaded support on port[0] = 21 00:18:56 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff0500020200000000100f0007e1000c080017001605ac1e", 0x24) close(r2) write(0xffffffffffffffff, &(0x7f0000000000)='$\x00\x00\x00!', 0x5) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x10000017e) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) 00:18:56 executing program 3: socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x8000000, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55", 0x7, 0x14, 0x0, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) r2 = socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r3, &(0x7f0000000500), 0x37d, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0x400d3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000180)) sendto$packet(r1, 0x0, 0x0, 0x8000000, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55fc92f0c5aa88", 0xd, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$nl_route_sched(r4, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4011, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000000000000da98866e0409e920c35000de290b1736b4a1a5d30b00000000000020000000001c000000006f07c3ef859207518476bb5fb0954580d736ba292fbfb8790854f373443941c00e47d1bb183487b22d3a4463dfc4a412597bd3a18edba9ebf1f29601f5ff945f71811424d744047d52febc4607ef39e4a3e04c06aaf402c602b8b259c60e5406687b0bf2dff89b58005127b333ca194ce8cd1c0ac73b6ea45ecfb718125d90288ef01ec4939bd904cc9d414cba0e09b5d3385204da4bab1ebd0c199a5eab10955885c985e78ac0da6872a69439d702a3433fda40f24726653b"], 0x88) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:18:56 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_TRY_EXT_CTRLS(0xffffffffffffffff, 0xc0205649, &(0x7f0000000180)={0xa30000, 0x4, 0x1, r4, 0x0, &(0x7f0000000140)={0x990a30, 0x0, [], @value=0x5}}) connect$unix(r5, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) r6 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r7, 0x0, r6) r8 = fcntl$dupfd(r7, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_SET_CPUID(r8, 0x4008ae8a, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000000000007000000000001001f000000ce950000a4570000000000000500004007000000060000000100010000004800000000000b00400000000004070000000900000000800000000000001700004007000000ffffffff20000000000000000000000007000000000104000900000008000000020000000001000000ff030000000001007fffffff0400000000000000010000c00000000001000000490000000000000000fd0b7524fae370f5a6d1355d75b53c9073cfbd7dff24d7253cd7db083f552c55694dc01fc29344a81662f2efae08a58815d779b80945a12309c7be3f1b59"]) r9 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) sendmsg$DEVLINK_CMD_PORT_GET(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x3c, 0x0, 0x800, 0x70bd26, 0x25dfdbfc, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20004054}, 0x4000085) r12 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000400)='nl80211\x00') r13 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = fcntl$dupfd(r14, 0x0, r13) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) ioctl$SG_GET_RESERVED_SIZE(r15, 0x2272, &(0x7f0000000600)) sendmsg$NL80211_CMD_NEW_INTERFACE(r11, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x34, r12, 0x10, 0x70bd2c, 0x25dfdbfb, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x4, 0xffffffffffffffff}}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x0, 0x3}}, @NL80211_ATTR_WIPHY={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000380)={r3}) write(r16, &(0x7f0000000040)="d9ecbec36b3ac1063ea2b7dbaf149496dab4df52477f9ef6fea9b43c7061b2d15f082313a4f132d3aea680652a59a59d08baa9a8a478cfdde073271458c6abcafc7350c6e342e65274942a646dcd6411d1e22f95e07cfdbaad7b8d2c750122ddcc3969bee61727808dac9522f4511519981b2b280b875d0fb93e9f495b9495d3950147b8fd9158231d21062adeca8326ac1c0198d906cfa698b45c02554c1dd51739aec4ea810a3e75ca29f0dfcad730205186fdc3a1e20b89e798ec3f688fa5c7", 0xc1) 00:18:56 executing program 2: unshare(0x40000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) [ 381.445048][ T27] audit: type=1804 audit(1582157937.023:47): pid=10316 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir663187942/syzkaller.qjUFd6/46/file0/bus" dev="loop5" ino=46 res=1 [ 381.491285][T10321] IPVS: ftp: loaded support on port[0] = 21 00:18:57 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) dup(0xffffffffffffffff) 00:18:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) dup2(r0, r1) r2 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000400)=ANY=[@ANYRES32=r3, @ANYBLOB="00000004"], 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0xf850}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000000)={r3, 0x7}, 0x8) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r4, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:57 executing program 3: socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x8000000, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55", 0x7, 0x14, 0x0, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) r2 = socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r3, &(0x7f0000000500), 0x37d, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0x400d3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000180)) sendto$packet(r1, 0x0, 0x0, 0x8000000, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55fc92f0c5aa88", 0xd, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$nl_route_sched(r4, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4011, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000000000000da98866e0409e920c35000de290b1736b4a1a5d30b00000000000020000000001c000000006f07c3ef859207518476bb5fb0954580d736ba292fbfb8790854f373443941c00e47d1bb183487b22d3a4463dfc4a412597bd3a18edba9ebf1f29601f5ff945f71811424d744047d52febc4607ef39e4a3e04c06aaf402c602b8b259c60e5406687b0bf2dff89b58005127b333ca194ce8cd1c0ac73b6ea45ecfb718125d90288ef01ec4939bd904cc9d414cba0e09b5d3385204da4bab1ebd0c199a5eab10955885c985e78ac0da6872a69439d702a3433fda40f24726653b"], 0x88) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:18:57 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 381.613570][ T8096] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:18:57 executing program 2: unshare(0x40000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) [ 381.802325][T10337] IPVS: ftp: loaded support on port[0] = 21 00:18:57 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x106) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') r8 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_NET_SET(r8, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)={0x20, r7, 0x1, 0x0, 0x0, {}, [@TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_BEARER_ADD(r6, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x74, r7, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x44, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x0, @remote, 0x101}}}}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3fd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xddb}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x24008001}, 0x4000094) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r3, 0x84, 0x1c, &(0x7f0000000100), &(0x7f00000000c0)=0x4) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000040)) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) [ 381.851808][T10341] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 381.876923][ T7] tipc: TX() has been purged, node left! [ 381.884973][ T7] tipc: TX() has been purged, node left! 00:18:57 executing program 2: unshare(0x40000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) [ 382.001347][ T27] audit: type=1804 audit(1582157937.573:48): pid=10341 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir663187942/syzkaller.qjUFd6/47/file0/bus" dev="loop5" ino=47 res=1 00:18:57 executing program 1: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) dup(0xffffffffffffffff) 00:18:57 executing program 3: socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x8000000, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55", 0x7, 0x14, 0x0, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) r2 = socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r3, &(0x7f0000000500), 0x37d, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0x400d3, 0x4) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000180)) sendto$packet(r1, 0x0, 0x0, 0x8000000, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55fc92f0c5aa88", 0xd, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$nl_route_sched(r4, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4011, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000000000000da98866e0409e920c35000de290b1736b4a1a5d30b00000000000020000000001c000000006f07c3ef859207518476bb5fb0954580d736ba292fbfb8790854f373443941c00e47d1bb183487b22d3a4463dfc4a412597bd3a18edba9ebf1f29601f5ff945f71811424d744047d52febc4607ef39e4a3e04c06aaf402c602b8b259c60e5406687b0bf2dff89b58005127b333ca194ce8cd1c0ac73b6ea45ecfb718125d90288ef01ec4939bd904cc9d414cba0e09b5d3385204da4bab1ebd0c199a5eab10955885c985e78ac0da6872a69439d702a3433fda40f24726653b"], 0x88) close(r5) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 382.150767][T10352] IPVS: ftp: loaded support on port[0] = 21 [ 382.153278][ T7] tipc: TX() has been purged, node left! 00:18:57 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 382.261230][T10361] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:18:57 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) [ 382.303206][ T7] tipc: TX() has been purged, node left! [ 382.466215][ T7] tipc: TX() has been purged, node left! 00:18:58 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x10003) [ 382.544379][ T27] audit: type=1804 audit(1582157938.123:49): pid=10361 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir364196792/syzkaller.hTobHo/66/file0/bus" dev="loop1" ino=48 res=1 [ 382.623255][ T7] tipc: TX() has been purged, node left! [ 382.669336][ T27] audit: type=1804 audit(1582157938.233:50): pid=10379 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir102534664/syzkaller.6Yr0A1/14/file0" dev="sda1" ino=16610 res=1 00:18:58 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) dup(0xffffffffffffffff) 00:18:58 executing program 2: r0 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) 00:18:58 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000440)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(0xffffffffffffffff, 0xc010641d, &(0x7f0000000500)={r4, &(0x7f0000000480)=""/69}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000040)={r4}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r3, 0x4010641c, &(0x7f0000000040)={r4, &(0x7f0000000000)=""/50}) 00:18:58 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 382.818079][ T2522] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 382.909771][T10384] overlayfs: conflicting lowerdir path 00:18:58 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x1c, 0x2, 0x3, 0x1, 0x0, 0x0, {}, [@NFQA_CFG_CMD={0x8, 0x1, {0x1}}]}, 0x1c}}, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x1, 0x3, 0x11}, 0x14}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r3, 0x0, r0, 0x0, 0x400000, 0x0) 00:18:58 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:58 executing program 2: r0 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) [ 383.097137][T10398] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:18:58 executing program 1: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f0000000040)={0x200007ff}, 0x10) write(0xffffffffffffffff, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e", 0x12) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r4, 0x0, 0x4ffe2, 0x0) 00:18:58 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$SIOCX25SCAUSEDIAG(r1, 0x89ec, &(0x7f0000000000)={0xfd, 0x2}) [ 383.228479][ T2522] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 00:18:58 executing program 0: r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r2, 0x0, 0x483, &(0x7f00000008c0), &(0x7f0000000840)=0x68) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_ENC_INDEX(r3, 0x8818564c, &(0x7f0000000000)) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) 00:18:58 executing program 3: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000001680)='./bus\x00', 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(r2, 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, 0x0, 0x20008040) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000001ac0)={&(0x7f0000000540), 0xc, &(0x7f0000000580)={&(0x7f0000000080)=ANY=[@ANYBLOB="00000000868527d2d23b9100000000", @ANYRES16=0x0, @ANYBLOB="0000000000000000000015000000"]}, 0x1, 0x0, 0x0, 0x4004}, 0x40000) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000100)=[@text32={0x20, &(0x7f0000000000)="3e260f090f20e0350000d7a5f30f09020019e02626205bf30f098503f800443c0f20c0c00f000000440f22c0b949090000f3e1000fae44ee08", 0x39}], 0x1, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r4, 0xae9a) r5 = dup(0xffffffffffffffff) dup2(r5, 0xffffffffffffffff) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000140), 0xc, &(0x7f0000000280)={0x0}}, 0x40000) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000003100)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000004c0)}, {&(0x7f00000005c0)="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", 0xeb7}], 0x2, &(0x7f0000000340)=[@timestamping={{0x14, 0x1, 0x25, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x7fffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x7604e93b}}, @txtime={{0x18, 0x1, 0x3d, 0x9}}], 0x78}}, {{&(0x7f00000015c0)=@isdn={0x22, 0x7, 0x3, 0x1, 0x69}, 0x80, &(0x7f0000001940)=[{&(0x7f0000001640)}, {&(0x7f0000001740)="f85a72d24e16db3c5023b39d98e380f2c7a77b98c71a3f470c945e1434a8ae260bdd23779d1b2d8fbbc59b688b1c8c0072f2c318107c74f6f10926e0fc85f56d451d11a0d0496f47e8817dcebc46b5261fd200b3daac788f7e6e69c7dc", 0x5d}, {&(0x7f0000001840)="0148f885e8d942d04ea7727593dc7c801ce7b86b3348a5951dec1cdaf960153d6df78fa8ece39ebd34a120d04115da93520a9bff602eda475a6606ceddabe84c026bbdb70b3dc3b888de286cee12c61aa7f6879ce9c78d82be6a5df831fc141c89b9b61828ee019143d48878faf4927b3c0de8ad51e997c3233e69f0c5d2be9098fffadd7d23851870331c43eaabcaa757b8ee1a0d1285e63202f3c29f", 0x9d}], 0x3, &(0x7f00000019c0)=[@txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0xf136}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x9}}], 0x60}}], 0x2, 0x8811) openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_SET_CPUID(0xffffffffffffffff, 0x4008ae8a, &(0x7f00000014c0)=ANY=[@ANYBLOB="06000000f80000000000000005000000070000000000000016ffffff00000000000000400900000001000000010000000000000000004000010000c0ff01000000000000060100000000f522b4"]) [ 383.326957][ T27] audit: type=1804 audit(1582157938.903:51): pid=10398 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir663187942/syzkaller.qjUFd6/48/file0/bus" dev="loop5" ino=49 res=1 00:18:59 executing program 2: r0 = socket(0x0, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) 00:18:59 executing program 5: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) dup(0xffffffffffffffff) 00:18:59 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:18:59 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) fcntl$dupfd(r2, 0x406, r4) ftruncate(r1, 0x1) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:18:59 executing program 2: r0 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) 00:18:59 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) sendmsg$inet6(r2, &(0x7f00000002c0)={&(0x7f0000000080)={0xa, 0x4e23, 0x1000000080000, @rand_addr="fe8000000000000065daf2f7b726cbbb"}, 0x1c, 0x0}, 0x0) [ 383.934009][ T8096] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 00:18:59 executing program 2: r0 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) 00:18:59 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setresuid(0xee01, 0x0, 0x0) add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f00000002c0)="f6", 0x1, 0xfffffffffffffffb) [ 384.219358][T10462] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 384.320480][ T27] audit: type=1804 audit(1582157939.893:52): pid=10462 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir663187942/syzkaller.qjUFd6/49/file0/bus" dev="loop5" ino=50 res=1 00:19:00 executing program 1: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x0, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x8000000, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21", 0x4, 0x14, 0x0, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r3, &(0x7f0000000500), 0x37d, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0x400d3, 0x4) sendto$packet(r2, 0x0, 0x0, 0x8000000, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55fc92f0c5aa88", 0xd, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$nl_route_sched(r4, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4011, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000000000000da98866e0409e920c35000de290b1736b4a1a5d30b00000000000020000000001c000000006f07c3ef859207518476bb5fb0954580d736ba292fbfb8790854f373443941c00e47d1bb183487b22d3a4463dfc4a412597bd3a18edba9ebf1f29601f5ff945f71811424d744047d52febc4607ef39e4a3e04c06aaf402c602b8b259c60e5406687b0bf2dff89b58005127b333ca194ce8cd1c0ac73b6ea45ecfb718125d90288ef01ec4939bd904cc9d414cba0e09b5d3385204da4bab1ebd0c199a5eab10955885c985e78ac0da6872a69439d702a3433fda40f24726653b"], 0x88) close(r5) syz_open_procfs(0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:19:00 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r3, 0x8983, &(0x7f0000000000)) 00:19:00 executing program 4: ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) getpid() setxattr(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]) recvfrom(0xffffffffffffffff, &(0x7f00000006c0)=""/4096, 0x1000, 0x2000, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) creat(0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r3, r4, &(0x7f0000000500)=0x10be, 0x7fffefff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000000180)) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) 00:19:00 executing program 2: r0 = socket(0x10, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) [ 384.719077][T10478] overlayfs: workdir and upperdir must reside under the same mount 00:19:00 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clock_adjtime(0x0, &(0x7f00000001c0)={0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x7, 0x2, 0x80000000, 0x5, 0xbe4, 0x7fffffff, 0x101, 0x4, 0xffffffff, 0x1, 0x7, 0xa3, 0x1, 0x2, 0x1, 0x3, 0x1, 0x1, 0x6}) 00:19:00 executing program 2: socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) 00:19:00 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000000)={0x0, 0x8, 0x7, 0x1, 0x880}) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r1, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:19:00 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) getpid() setxattr(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]) recvfrom(0xffffffffffffffff, &(0x7f00000006c0)=""/4096, 0x1000, 0x2000, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) creat(0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r3, r4, &(0x7f0000000500)=0x10be, 0x7fffefff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000000180)) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) 00:19:00 executing program 1: socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x0, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x8000000, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21", 0x4, 0x14, 0x0, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) r3 = socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(r3, 0x0, 0x8, 0x0, &(0x7f0000000180)) sendto$packet(r2, 0x0, 0x0, 0x8000000, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55fc92f0c5aa", 0xc, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4011, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000000000000da98866e0409e920c35000de290b1736b4a1a5d30b00000000000020000000001c000000006f07c3ef859207518476bb5fb0954580d736ba292fbfb8790854f373443941c00e47d1bb183487b22d3a4463dfc4a412597bd3a18edba9ebf1f29601f5ff945f71811424d744047d52febc4607ef39e4a3e04c06aaf402c602b8b259c60e5406687b0bf2dff89b58005127b333ca194ce8cd1c0ac73b6ea45e"], 0xa6) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:19:00 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 385.053409][ T21] FAT-fs (loop5): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 00:19:00 executing program 2: socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) [ 385.157827][T10511] overlayfs: conflicting lowerdir path 00:19:00 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x10000, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$KVM_SET_NESTED_STATE(r0, 0x4080aebf, &(0x7f0000000280)={{0x6, 0x0, 0x80, {0x6000, 0x100000, 0x3}}, "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", "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"}) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$SIOCGETLINKNAME(r3, 0x89e0, &(0x7f0000000080)={0x3, 0x1}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockopt$bt_BT_POWER(r4, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:19:00 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="08418330e91000105ab071") socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) r3 = socket$inet(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x4e20}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) r4 = dup3(r3, r2, 0x0) write$binfmt_script(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="c0d169e2dd9ba17f47ad91c741c653e3804ef64ffd9cfbdc42be86225508e0a99b5081e8658a43f301346bf85845f2ffde69779b8a49a401a2746e00"/69], 0x45) io_setup(0x20, &(0x7f00000001c0)=0x0) io_submit(r5, 0x1e0933b8, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) 00:19:00 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:00 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/zero\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, 0x0, 0x20008040) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000040)="66ba4100b800000000ef0f01c5c442410af6670f01c2400f78b42407000000c4030d4a201cb805000000b90f0000000f01d90f18e0f043832f00644a0fc71b", 0x3f}], 0x1, 0x8, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000003100)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000004c0)}, {&(0x7f00000005c0)="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", 0xcb5}], 0x2}}], 0x1, 0x8811) 00:19:01 executing program 2: socket(0x10, 0x803, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) 00:19:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) getpid() setxattr(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]) recvfrom(0xffffffffffffffff, &(0x7f00000006c0)=""/4096, 0x1000, 0x2000, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) creat(0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r3, r4, &(0x7f0000000500)=0x10be, 0x7fffefff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000000180)) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) [ 385.501451][T10531] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 00:19:01 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000000)=0xe6d0, 0x4) [ 385.656719][T10540] overlayfs: conflicting lowerdir path 00:19:01 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 00:19:01 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) accept4$nfc_llcp(r0, &(0x7f0000000080), &(0x7f0000000100)=0x60, 0x80800) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x0, 0x1, {0x35, 0x37, 0x15, 0x17, 0x2, 0x2, 0x3, 0x4c, 0x206006cf7fa973b2}}) getsockopt$bt_BT_POWER(0xffffffffffffffff, 0x112, 0x8, 0x0, &(0x7f0000000240)) [ 385.766400][T10542] kvm: emulating exchange as write 00:19:01 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:01 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000040)) getpid() setxattr(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, &(0x7f0000000540)=ANY=[@ANYBLOB="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"]) recvfrom(0xffffffffffffffff, &(0x7f00000006c0)=""/4096, 0x1000, 0x2000, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) creat(0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) getsockopt$IPT_SO_GET_REVISION_MATCH(r2, 0x0, 0x42, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) r3 = accept4(r1, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r3, r4, &(0x7f0000000500)=0x10be, 0x7fffefff) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8982, &(0x7f0000000180)) write$binfmt_elf32(0xffffffffffffffff, 0x0, 0x0) 00:19:01 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 00:19:01 executing program 0: syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$bt_BT_POWER(r2, 0x112, 0x8, 0x0, &(0x7f0000000000)) 00:19:01 executing program 5: socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r2, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000180)) sendto$packet(r0, 0x0, 0x0, 0x8000000, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55fc92f0c5aa", 0xc, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000000000000da98866e0409e920c35000de290b1736b4a1a5d30b00000000000020000000001c000000006f07c3ef859207518476bb5fb0954580d736ba292fbfb8790854f373443941c00e47d1bb183487b22d3a4463dfc4a412597bd3a18edba9ebf1f29601f5ff945f71811424d744047d52febc4607ef39e4a3e04c06aaf402c602b8b259c60e5406687b0bf2dff89b58005127b333ca194ce8cd1c0ac73b6ea45ecfb718125d90288ef01ec4939bd904cc9d414cba0e09b5d3385204da4bab1ebd0c199a5eab10955885c985e78ac0da6872a6"], 0xd8) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:19:01 executing program 1: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000001c00)='/dev/zero\x00', 0x0, 0x0) open(0x0, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, 0x0, 0x20008040) sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000100)=[@text64={0x40, &(0x7f0000000040)="66ba4100b800000000ef0f01c5c442410af6670f01c2400f78b42407000000c4030d4a201cb805000000b90f0000000f01d90f18e0f043832f00644a0fc71b", 0x3f}], 0x1, 0x8, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff5d, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x11c000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$KVM_RUN(r2, 0xae80, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000003100)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000004c0)}, {&(0x7f00000005c0)="da7323b58b86c60c050eaacf7690ef2ea7378ce8391312c6ea070320e8559eb51e85801779d2d617c3949be82f7a51c4b2ef8a4e607d2105edbb9fc6398c81843854a3bd7dea6fb43e37e08698af4335c79f1cf6c9b6ab803acccf5749684564ce053a05ac02b132db9dad9eb6ddf4a8b0bec8c538be2628f6bd621fabb6efc621c5f2217ce3b88853b777a018458080f22a7691b8ffb49f99beb469498cd96a714cedd624a19af9e50c811919ac522ffc7f1ad40e1f94156a965b4f437448f468398db820504d2a8e04edf5140c3e8e70149600804b4daa9eb19b413f87067b94de0a51c8a7b307aeab411bd3c88cfcb148f02995577a1252eadc2619603ce15d1acf7bd2dab0abdf5ef768d833f69c0ad2d95a5972e3ea7fc357b20630153af6fbee8e941ce9b73eb1b0c6998995af4443294abedc3565a3cd2d9873c332d00273955301dd3922d8db37d44e21f08d7cb0d5c2fd381492fe9263f3a673fbd0867bf0c3a1fc6185934243fe24983c8c0d6cb3f2cf60664ba0de080c76d302a9835fb48322e2f00d73a6100b40836458d6eb453a020804dcb6069a12e32c04286ed50b3e0675da79215c3ef2f33069547738b2fc5f016dae4ef6679b5e749498bec6e6c9d0501e4be543915ec62da854b62b2849291e168cfc0235e764f4815ff1d89bd19d9517cba6d97d1f0afb7660c7e94f8e2abc38fd32a2e94bc35e4986cff143a949c63cb2a8f308e7b1263e8dcab23887c58b71cd2aecb6ce2af5deffc4fc3e241a6a8df34322eebc4a7e362ac3ef63ea2916b6f7c6865bcd2023a8bbe37517d49247e41fe723716489460b724df8b543c57d441cd8db2363c9e38ecb00a0656149c3441aa0a962d98396a2a208126329d7b4c24b8d96622b53c34d5b128d842dc5a57729e03bc73886c798b5990eae140144e7dec9126d4a97c2079dad7aa8c32472bd4314968d32c12761ccc88bccd4f5b1f51446f1b3875a38943859b13e5ffe1034484bfc951d79521c4457878c1e88f678150847623d15b6f4ca19a84ca52ce1a6694474a34e2ce5757489676954d15134b18a5b43c7ace366e7acb4c07330c4b61d0ab4bc02f8168d4605e9c551c8dedba74803434c5cf91aa7c6586a58d712b600d117e1cada69844f135bfdbe7067142ba5de632e4351faca09ce412b92dd1e64a307a12f95ac1f5a04d39fad2c0c593609c4498bc4c527688d1c74871d7629237bd044fc96c080989edafabfd42caec4ddf75b680a99d0999ef7a1f846c06c01fc3d5dfbb4e972919e3bd84209fb0a1bf70dd43afbb9989a282e62b0f23b66c0ba00e7bb6b884f844d833da5fb3804bcd6778a33a5bcf7e747b84e6dd15637895689efd72097c5a1a40da40dbf655cd42753080bf17cfc9fa40b0bae007903ecbb1852a3c07a0fcab55fe34fad31bd5d70de86867a310ee34995a670c9abcb560dc84d36f71538dd205eb120759e73041471501a768cae4c0debb395a2e729c0ead9620a7a054ed1d2eea19476ed9fb20207fe46bf5cc87527af2d9b548733bb0523fe6e29bab1c2b4595d6ce8cadb51078c53658ddf32ee4b477ce97368bf022a12abfab10352f21bc5a33a128f435310319f6ef275bf4595dcff15296220f1e6cbb4a5e740c3948802e1cb0ffcb83287580a7d1f5da45607b6106b89ee1af23e69725d81072ce693dd72272e36573f9cde63b09ff9545024b3e586693f53a56538510ec9475f00faabe1262294a1c420b9b4439b6ef3d82f283b69b3378e3c10ee8c8fd2893195ae53200df2e857ccfe2963ea65c717bc455e2207c16b74d2f4fd1048addbfed66e156a9b21bfc01247c050a86f8c4d918f5ebdaf30aae6bf00a98fca6c93d106d3990a3b8c1bfd31074d1778c06ecf67791e93cd751d57e327a5552b2b35d052dd9104ffed8839bd1648eaaa518fa25e7675cd8d319fe8e506c38f4b7b1a2537d8119845c74f1008056d5f07f4ccaa194a861d7a4cc890156af1fc7ad776c4d3a1939b6f7d3d8dc6cf4af9f7f7e10bcd62ca2e74a92d605b3a2987a02a3eb7a829a7633c78e32524b688f43623a970b9020864909d575ad30fe0dafa701f92f22b1f72b9b31704309dc0a05ba79ae0fdf79ca427e68e959e017db5692d0d009213086b4464bd52864ae52987486b2459c41004124859a812cde5e4ce72b54b643f82041d40c6274b497f30b605a5c3458ebd833bf25948179b37987140342ef29f336c7d158c7e0e1209b4804668327611df480bb58f07b94a5af0d7f2cf3985c65c6e41ff337ac7c2ad2ccf5c3a1819e78401cdaab8de4686647ee2bf8a6dc2bc2895422ba4a3fd5757de06d82a6632238ba73b2df00ffae26877d90c429d7c07ec1a9368eb7b931c6937bcd6a0ecec82ce2eeff7b0f992e9cdb823b2a9a4bf26c036173e847f67e88d8e157f5c2d03efa690d7a537e54f366182a63a769b8b7ea6427720e1ab6a04af4ecc6f2f6528ce2a349b1bd408eafc5166879b6b2e69ffd968b3239fc01df60cfbd4c6d26408482473f4327faf91efbd42aa8f7551b737363732499f9845f0319683c8c606701724096d5d936b8d839a8dfafe64a5bef170e3a5d0941d68d0507b33e0330d5d1bda9d1fb4a4c98ffc9f98870a77fee1c932ec3bf30c5c05e2ad44569f098b7ee3e9642fad74056ec4d3f6daab5a11872e5220238d6aca2607d70ded6e0d1bfd217ad7c5ec1263a4a6e6214b99a9303acc2dc733562a221748f9e03747dcaa179b9bba8fb1bfcfa239729463f1a6f3c97e87cd1b77306e10dbd4770ab354071a35f34e67b6276a852b78d90a30a594051488ec5826b53febbc95697773e48fe6119b218e3fb0f6165c01292643340306bb6999b1d9a99ad834f6495d69a63991332d4d11e184fbfa467ead25137e7b8dafac60ebd757a36619e4f36654ff2e53c09cc6d58aa472a825cb2b07a35ab9319089debd8561c4094d24f63594de629d5a9598ca3365321fe685baa841e0c52066861e02dd072a14742626e1f22ed1c2f1cd4534949c1f29ebc67bb70cea6ecb00e807a5f6d4bf4eedf589fb7f6fa09f44b28e127cd581665da0494d229cffba318df7ed526b2076ad5b6767b4cc1f421a14387cc35de36c7139d0d3068061717409ddb9c22b8791506641f09e0abfdb4e7f5578d45676f5745ab637942116c343ca36790c5924c1dc097eb13497d7b791bcc4194836b02153336f76ba116197d32c2f897abb44137f94beffc72f2085d5e9599062d23c84a5ec1afb060d665f516a448c9660ebe388d5932c8140816b3440830623bda7dac89c8b2ddcef8bacfa0213e7b7350f775773979b370882875cc525f9918d4cc15ab4ac91a1c3486177c349bb69f482292be15a807ba5e80e45d97b51818d981ad1b7d1b65643e608f829008fd42ce10f5a8249447e135b85ef0a566438626243e97bf08760252d921027575ea6993d52b7d9d329812ffa1a95ceadab911bfa1d1546e271deb2ade975074f2c892063c51ab68f6fdc92fe455ad9398a2dc79a4c644640ed4baf91ee2d6ea3e2e39e7c7ecd82472444af1e383d1a90238c6ffdcba8fe55175b65d1a3e558ef1a436a4ef81a346bb6526428fd338dbbe049495e7e8513f7afa5baf99e0da305d0c0d1e217581df7cd4f0d289b539fd2fab400e6175c61e0c3d1164696f32098aabb62a863703113fe126cd69d471b915398ae4b6b79809adbd03a0f3df1f576ffa32c6680b7a3111538db547b8fc5d42a3f64efc9a8d8076dfef63398baa6c553a924f3b1ffc51d25b58496a6a5bfff8a3347d506da8689ec9e3745eb0fcec7dbc6fd6baf67dfb18466c2c38828a8f28bc3d9b923d871821509475060a1b3d08bb2bb306f433c27d4a0b0749fb6ba3be3c8a8494f8b956d9c5a4a5dff2d617e305fed168841ed41c05cec4fd6a0bb811fb76505da1e16d06ac0446a4fc63508e38eade6ab26106509e37aa7ecb81ed5b37826d7bf31eb077236b4d59d0710477e0cd1dbaee4c70495ba6595481e621bd92637c657710e558bee66d16b668a19de54d8c2c321da13155aa9ced752b839e1e06b84fb97dfa8cd0f7404a9c976a50b0edcc1cbff3780610bf0c0e4274a86d9d2dfb00b6dd29f18239e3ba6e5d4516a8a2b48779f3c0588ae806167d83eace81050febb4d8af2fa15403091a8b8a7b7bf43bf2c7a7222c1f521bfa1b035c8596913bec56413715348ae243a4b71645b7f4602e40532f1fdbaf25595391c0552184ad6012614f27e1786b96dc8b64a1010aab8a4d1d4daebafb6d04d0a83c6b792c13000043175a1e58a7e5ffef81a27b9f5b7bcb3f23f529aba5fff1e73e099ff89cbfbf1088244bb91631cf3074a5ed3dcebf175c15be30535f92f76419a7546a61d3ff424b450444b53c2b6c144ff78a3b693dab9329a3b0d9e0f86f7ada64d52a46ac176f26e7a2c4db33042d27c4c2e649f2f0295fa32387137378457ef556c5a47def7e7251b058fcd872c1b46aab4f70829649fee264c3a8e45b7cf066b7143a4d97f00d79ff416558771e8674bb8b46eed61880567ebdd78ac3a0c3f650baf39ad144ef2fb045fb19627346b85", 0xcb5}], 0x2}}], 0x1, 0x8811) 00:19:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0xfea2, 0x20000802, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) sendto$inet(r2, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xffffffd8) 00:19:01 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 00:19:01 executing program 0: r0 = msgget$private(0x0, 0x80) msgctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/217) r1 = accept4$x25(0xffffffffffffffff, &(0x7f0000000740), &(0x7f0000000780)=0x12, 0x80000) r2 = gettid() ioprio_set$pid(0x2, r2, 0x0) syz_open_procfs(r2, &(0x7f0000000240)='net\x00') r3 = getpgid(r2) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f00000007c0)=r3) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r5 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r9 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) fsetxattr$trusted_overlay_opaque(r11, &(0x7f0000000200)='trusted.overlay.opaque\x00', &(0x7f0000000440)='y\x00', 0x2, 0x1) sendmsg$TIPC_NL_PUBL_GET(r7, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0x190, r8, 0x20, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x9}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}]}, @TIPC_NLA_MEDIA={0x84, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f00}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd6b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000001}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xa6}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x1}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x2}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x401}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0xea60}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5}]}, @TIPC_NLA_MEDIA={0x18, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}]}, @TIPC_NLA_MON={0x3c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x65}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x81}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}]}, @TIPC_NLA_NODE={0x44, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x40}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x4880}, 0x4040000) getsockopt$bt_BT_POWER(r4, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:19:02 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:02 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000880)='/dev/snd/seq\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socket$nl_generic(0x10, 0x3, 0x10) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f0000000000)={0x51, 0x7ff}) ioctl$TIOCMBIC(r2, 0x5417, &(0x7f0000000040)=0x3) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) 00:19:02 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:19:02 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:02 executing program 5: socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r2, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000180)) sendto$packet(r0, 0x0, 0x0, 0x8000000, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55fc92f0c5aa", 0xc, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000000000000da98866e0409e920c35000de290b1736b4a1a5d30b00000000000020000000001c000000006f07c3ef859207518476bb5fb0954580d736ba292fbfb8790854f373443941c00e47d1bb183487b22d3a4463dfc4a412597bd3a18edba9ebf1f29601f5ff945f71811424d744047d52febc4607ef39e4a3e04c06aaf402c602b8b259c60e5406687b0bf2dff89b58005127b333ca194ce8cd1c0ac73b6ea45ecfb718125d90288ef01ec4939bd904cc9d414cba0e09b5d3385204da4bab1ebd0c199a5eab10955885c985e78ac0da6872a6"], 0xd8) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 386.653281][ T7] tipc: TX() has been purged, node left! 00:19:02 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_init_net_socket$rose(0xb, 0x5, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000040)={0x0, 0x4, [@remote, @multicast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, @broadcast]}) 00:19:02 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 386.803241][ T7] tipc: TX() has been purged, node left! 00:19:02 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 386.953607][ T7] tipc: TX() has been purged, node left! 00:19:02 executing program 1: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x0, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x8000000, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x14, 0x0, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000500), 0x37d, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) sendto$packet(r2, 0x0, 0x0, 0x8000000, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55fc92f0c5aa88", 0xd, 0x0, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$nl_route_sched(r3, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x4011, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x8001, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) close(r4) syz_open_procfs(0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:19:02 executing program 3: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x2012, r0, 0xffffd000) 00:19:02 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r0, 0x112, 0x8, 0x0, &(0x7f0000000240)) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)='wlan0cpuset&#>\x00') r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x68180, 0x0) write$P9_RXATTRCREATE(r2, &(0x7f0000000040)={0x7, 0x21, 0x2}, 0x7) 00:19:02 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 00:19:02 executing program 5: socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r2, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000180)) sendto$packet(r0, 0x0, 0x0, 0x8000000, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55fc92f0c5aa", 0xc, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000000000000da98866e0409e920c35000de290b1736b4a1a5d30b00000000000020000000001c000000006f07c3ef859207518476bb5fb0954580d736ba292fbfb8790854f373443941c00e47d1bb183487b22d3a4463dfc4a412597bd3a18edba9ebf1f29601f5ff945f71811424d744047d52febc4607ef39e4a3e04c06aaf402c602b8b259c60e5406687b0bf2dff89b58005127b333ca194ce8cd1c0ac73b6ea45ecfb718125d90288ef01ec4939bd904cc9d414cba0e09b5d3385204da4bab1ebd0c199a5eab10955885c985e78ac0da6872a6"], 0xd8) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:19:02 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:03 executing program 1: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="2400000020002551075c0165ff0500020200000000100f0007e1000c0800170016", 0x21) close(r2) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0x10000017e) socket$netlink(0x10, 0x3, 0x0) splice(r0, 0x0, r2, 0x0, 0x4ff60, 0x0) [ 387.382905][T10645] overlayfs: failed to resolve './file1': -2 00:19:03 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 00:19:03 executing program 0: ioctl$VIDIOC_S_EXT_CTRLS(0xffffffffffffffff, 0xc0205648, &(0x7f00000002c0)={0xa10000, 0x5, 0x9, 0xffffffffffffffff, 0x0, &(0x7f0000000280)={0xa2093e, 0x1, [], @string=&(0x7f0000000200)=0x3}}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000640)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r1, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c810}, 0x4044880) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f00000004c0)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) sendmsg$NFT_MSG_GETOBJ_RESET(r3, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x74, 0x15, 0xa, 0x201, 0x0, 0x0, {0x3}, [@NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x5}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x5}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x2}, @NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x3}]}, 0x74}, 0x1, 0x0, 0x0, 0x24040850}, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'syz_tun\x00', 0x0}) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x3d2}}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="340000001000010400"/20, @ANYRES32=r7, @ANYBLOB="0000000000000000140012000c0001006272696467650000000200"], 0x34}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000019c0)=ANY=[@ANYBLOB="280000001000010400"/20, @ANYRES32=r5, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=r7, @ANYBLOB="5e848cca82d53536644c9b385431d187ad15ea68953bf8af448134058762adf04a9cf95f72f2c1e476b400"/52], 0x28}}, 0x0) connect(0xffffffffffffffff, &(0x7f0000000440)=@ll={0x11, 0x15, r7, 0x1, 0xef, 0x6, @broadcast}, 0x80) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_POWER(r8, 0x112, 0x8, 0x0, &(0x7f0000000240)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={0xffffffffffffffff, &(0x7f0000000040)="be8c8cc9464b29b9d120310f76b725d0b0a5c15b2df48ef59db26cc180fbbdd62f234a7b97c9d2ff91cecbcc2824106f46bb48cbd31c272bdf31ca7a98cd4e190fbb33725a5d15e05b1ffcdf338186104537f19aee035851faf5a1eb4084a741a8c072581cfb17ac94c0697ccf2b8c927a858c19075c12490061f7ba0bf331cf4df383a072c777", &(0x7f0000000100)=""/166, 0x4}, 0x20) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x41, &(0x7f0000000000)=0x88, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) 00:19:03 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:03 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x0, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x8000000, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c", 0x6, 0x14, 0x0, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r3, &(0x7f0000000500), 0x37d, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0x400d3, 0x4) sendto$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$nl_route_sched(r4, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000000000000da98866e0409e920c35000de290b1736b4a1a5d30b00000000000020000000001c000000006f07c3ef859207518476bb5fb0954580d736ba292fbfb8790854f373443941c00e47d1bb183487b22d3a4463dfc4a412597bd3a18edba9ebf1f29601f5ff945f71811424d744"], 0x73) close(r5) syz_open_procfs(0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:19:03 executing program 5: socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') r0 = socket$packet(0x11, 0x0, 0x300) r1 = socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r2, 0x0, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(r1, 0x0, 0x8, 0x0, &(0x7f0000000180)) sendto$packet(r0, 0x0, 0x0, 0x8000000, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55fc92f0c5aa", 0xc, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000000000000da98866e0409e920c35000de290b1736b4a1a5d30b00000000000020000000001c000000006f07c3ef859207518476bb5fb0954580d736ba292fbfb8790854f373443941c00e47d1bb183487b22d3a4463dfc4a412597bd3a18edba9ebf1f29601f5ff945f71811424d744047d52febc4607ef39e4a3e04c06aaf402c602b8b259c60e5406687b0bf2dff89b58005127b333ca194ce8cd1c0ac73b6ea45ecfb718125d90288ef01ec4939bd904cc9d414cba0e09b5d3385204da4bab1ebd0c199a5eab10955885c985e78ac0da6872a6"], 0xd8) close(r3) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 387.635247][T10666] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 387.689999][T10672] bridge1: port 1(syz_tun) entered blocking state [ 387.737544][T10669] overlayfs: failed to resolve './file1': -2 [ 387.743284][T10672] bridge1: port 1(syz_tun) entered disabled state 00:19:03 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) [ 387.788148][T10672] device syz_tun entered promiscuous mode 00:19:03 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:03 executing program 0: mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) chmod(&(0x7f0000000080)='./bus\x00', 0x5e) lstat(&(0x7f0000000180)='./bus\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000140)="08418330e91000105ab071") stat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r0, r2, 0x0) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 00:19:03 executing program 5: ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000240)=0xffffffffffffffff) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(0xffffffffffffffff, 0x5385, 0x0) listen(0xffffffffffffffff, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224\x00'}, 0x58) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f0000000500)=0x10be, 0x7fffefff) socket$inet_tcp(0x2, 0x1, 0x0) dup(0xffffffffffffffff) 00:19:03 executing program 3: openat$vcsa(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x0, 0x0, 0x0) setsockopt$inet_int(r0, 0x0, 0x8, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x8000000, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c", 0x6, 0x14, 0x0, 0x0) r1 = socket$inet(0x10, 0x2, 0x0) r2 = socket$packet(0x11, 0x0, 0x300) socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r3, &(0x7f0000000500), 0x37d, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)=0x400d3, 0x4) sendto$packet(r2, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r1, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) r4 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) sendmsg$nl_route_sched(r4, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r5, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000000000000da98866e0409e920c35000de290b1736b4a1a5d30b00000000000020000000001c000000006f07c3ef859207518476bb5fb0954580d736ba292fbfb8790854f373443941c00e47d1bb183487b22d3a4463dfc4a412597bd3a18edba9ebf1f29601f5ff945f71811424d744"], 0x73) close(r5) syz_open_procfs(0x0, 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) 00:19:03 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) [ 388.168878][T10702] overlayfs: failed to resolve './file1': -2 00:19:04 executing program 1: r0 = socket$inet(0x2, 0x3, 0xff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x29, &(0x7f0000000200)={0x5}, 0x4) sendto$inet(r0, &(0x7f0000000000)="86bf1f4785050000002faae542070000000000002d11351f", 0x18, 0x0, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x10) 00:19:04 executing program 0: r0 = syz_open_dev$sg(&(0x7f00000000c0)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x20011, r0, 0x0) 00:19:04 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) 00:19:04 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:04 executing program 5: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t~-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 00:19:04 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRESDEC, @ANYPTR], @ANYRES16=r0, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64], @ANYBLOB="70e570996154de99c3bfba74958e79b5853aeeaba4a91c16b605d4859802cc5940f238088b94b20153747c365626abd09a875ed32c34ddc6da65dac5ce44e9681d4ea8f1697a27f629cd9079f68f563a6184843b899f878bb1f268cce3031a5e4de7b199e35084bf9556955b77fd73e50d1f65462ebee0019889d472f1284510bbf97b375aaac003a505f4431d2a4dfa92a0040c4fbb83eba712bb45845e64cc8c7c8201268163a381dd86c880fda6b49c83ec44ae0f6ab5e8c521d2fd615a07fb0d132eb45afab1"], 0xda) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) 00:19:04 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) [ 388.654728][T10728] overlayfs: conflicting lowerdir path 00:19:04 executing program 0: r0 = socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000001180)=[{{&(0x7f0000000080)=@caif=@dbg, 0x80, 0x0}}], 0x1, 0x0, 0x0) 00:19:04 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netlink(r0, 0x10e, 0xb, &(0x7f00007e0000)=""/4, &(0x7f0000000000)=0x4) 00:19:04 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x0, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x44}}, 0x0) 00:19:04 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x0, 0x3, 0x11}, 0x14}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000140)=ANY=[], 0xfd53) splice(r3, 0x0, r0, 0x0, 0x400000, 0x0) 00:19:04 executing program 3: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000880)=ANY=[@ANYPTR=&(0x7f0000000040)=ANY=[@ANYRESDEC, @ANYPTR], @ANYRES16=r0, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64], @ANYBLOB="70e570996154de99c3bfba74958e79b5853aeeaba4a91c16b605d4859802cc5940f238088b94b20153747c365626abd09a875ed32c34ddc6da65dac5ce44e9681d4ea8f1697a27f629cd9079f68f563a6184843b899f878bb1f268cce3031a5e4de7b199e35084bf9556955b77fd73e50d1f65462ebee0019889d472f1284510bbf97b375aaac003a505f4431d2a4dfa92a0040c4fbb83eba712bb45845e64cc8c7c8201268163a381dd86c880fda6b49c83ec44ae0f6ab5e8c521d2fd615a07fb0d132eb45afab1"], 0xda) sendfile(r1, r1, &(0x7f0000000240), 0x7fff) [ 389.034082][T10754] overlayfs: conflicting lowerdir path 00:19:04 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:19:04 executing program 1: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) syz_mount_image$tmpfs(&(0x7f0000000380)='tmpfs\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002600)={[{@mode={'mode'}}, {@nr_blocks={'nr_blocks'}}], [{@obj_role={'obj_role'}}]}) 00:19:04 executing program 0: r0 = socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000001180)=[{{&(0x7f0000000080)=@caif=@dbg, 0x80, 0x0}}], 0x1, 0x0, 0x0) 00:19:04 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:04 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) syz_genetlink_get_family_id$team(0x0) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) r5 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r7, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000001300)) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 00:19:04 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:19:05 executing program 3: socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x8000000, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040), 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, 0x0) syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') r0 = socket$inet(0x10, 0x2, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) r2 = socket(0xa, 0x2, 0x0) syz_open_procfs(0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') preadv(r3, &(0x7f0000000500), 0x37d, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, 0x0, &(0x7f0000000180)) sendto$packet(r1, 0x0, 0x0, 0x8000000, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000100)={'wg2\x00'}) sendto$packet(0xffffffffffffffff, &(0x7f0000000000)="43b4ce21eb8c55fc92f0c5aa88", 0xd, 0x0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x401, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) write$binfmt_script(r4, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000000000000da98866e0409e920c35000de290b1736b4a1a5d30b00000000000020000000001c000000006f07c3ef859207518476bb5fb0954580d736ba292fbfb8790854f373443941c00e47d1bb183487b22d3a4463dfc4a412597bd3a18edba9ebf1f29601f5ff945f71811424d744047d52febc4607ef39e4a3e04c06aaf402c602b8b259c60e5406687b0bf2dff89b58005127b333ca194ce8cd1c0ac73b6ea45ecfb718125d90288ef01ec4939bd904cc9d414cba0e09b5d3385204da4bab1ebd0c199a5eab10955885c985e78ac0da6872a69439d702a3433fda40f24726653b"], 0x88) close(r4) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) [ 389.406464][T10770] tmpfs: Bad value for 'nr_blocks' [ 389.417381][T10773] overlayfs: conflicting lowerdir path 00:19:05 executing program 0: r0 = socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaacaaaa0000580000060000009078ac141400e00000020420880b0040000000000800000086dd080088be00000000100000000100000000000000080007eb0040000020000000025b2f1a556c972c66af00000000000000f5b9536f3200000000280065cad23844ee93f82bb8d4d662ef3215e1d91c574dd11a9080ce137e9bbf67bfcfa26515556c349c04431017ba22a2fcc52e9df0d9df3217a4868e0000ee40115943f7fcf61910d290591b08cafb5d479044923a620e6674bc1900fb942bf3ebda1f04112aec03346ae2b331d65bb9ba8bc6effa3e275daa79442ff833a6ceeb33605476a3f4e68bda8e23553f773e4393b252896eec7b058636886596ffb0cb419fe0490a54182876df9f91521e326d46476f567e70c1cc95602dac12b172ce2d58eddea79c56b898524a570da4e77a9e8e508f4f1fe406fa0b19015414bbc87f02eca9bfffffffffa17c205e7d6500000000004ab112e95fc82698885068f36cd9080f1315088e0c28acc20de40b8446d79aec608b372c1da7a412d8852b2214f3f2b7dcad27eaa837719e5f4687092fe5e4887a5e6a2cba1a1f7fb9b76d02e62c2b79e590d6302e3ea73f4a73a2a972ce8830c8f036e75be07f6435515d4fa5fc20940630a31c8555c7fcc969347ed1b1e137c1ceb74780e8558ca94987a73a75d30b48275ed8d5cbdb403943b47c138f052a46c8440ce6f36cac5fe4585de3514990fc7c60a506925a8d602a9942262819fa84c2c8b50000000000000000000000eb260f32834bc30c63ac52c58b301bba6e93b909952aefb1062b06e102a32babf206d317fc8095e2ea3670632ae24655737ac77556bbed6335e7ee561a9e45f791e9f1b11d811fe65cc5f248f24036f9f2f3eb22f81420b60f4e035b73b02079ef020572e58a3689f9f4a9630ec3ac580e2b92881b34517a5d2f9cc9363aa75a2025f8ae272e84b3034e115c424526910e6288ee7f7058d7480c9f"], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000001180)=[{{&(0x7f0000000080)=@caif=@dbg, 0x80, 0x0}}], 0x1, 0x0, 0x0) 00:19:05 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:05 executing program 1: r0 = socket$inet(0x2, 0x3, 0xff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendto$inet(r0, &(0x7f0000000000)="86bf1f4785050000002faae542070000000000002d11351f", 0x18, 0xa00, &(0x7f00000001c0)={0x2, 0x0, @remote}, 0x10) 00:19:05 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6gretap={{0xe, 0x1, 'ip6gretap\x00'}, {0x4}}}]}, 0x38}}, 0x0) 00:19:05 executing program 0: r0 = socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) recvmmsg(r0, &(0x7f0000001180)=[{{&(0x7f0000000080)=@caif=@dbg, 0x80, 0x0}}], 0x1, 0x0, 0x0) [ 389.770094][T10798] overlayfs: conflicting lowerdir path 00:19:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffe4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="aaf20000e746b85cb01e92550250a490cff4300ad49be094008090bcf7bdf5a4d0dacee21d438be196e80742259eb3a1ac7e004b94f9b7ab4baa81cf128f5f61a199ab7c2badfb67c00ca013e15c05fb9a13f9557e4a9191f6c477a723c6fc1f10aca3e062d95598fbf27d12a60451f0e13ceed34dda1a105b18d79383f0ef5237116d32d45ead01d0cb6ad41f7185ad664506ae44b9c79abba5de97372bd4a87357cd6c895780dcebe38410add118"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400fbc7000000000000000200000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000100000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 00:19:05 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x11, 0x800000003, 0x0) bind(r1, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=@ipv4_newaddr={0x20, 0x14, 0x101, 0x0, 0x0, {0x2, 0x0, 0x0, 0x0, r2}, [@IFA_LOCAL={0x8, 0x2, @remote}]}, 0x20}}, 0x0) 00:19:05 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x2c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x2c}}, 0x0) 00:19:05 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 390.118209][T10826] overlayfs: conflicting lowerdir path 00:19:05 executing program 5: r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000000c0)={0x19, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2000000]}, 0x3c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000240)=' ', &(0x7f0000000400)='\a'}, 0x20) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r0, &(0x7f0000000500), &(0x7f0000000000)="10"}, 0x20) 00:19:05 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:19:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0xffe4) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000006c0)=ANY=[@ANYBLOB="4800000010000d07cdd87d345d28000000000000", @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c0001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="aaf20000e746b85cb01e92550250a490cff4300ad49be094008090bcf7bdf5a4d0dacee21d438be196e80742259eb3a1ac7e004b94f9b7ab4baa81cf128f5f61a199ab7c2badfb67c00ca013e15c05fb9a13f9557e4a9191f6c477a723c6fc1f10aca3e062d95598fbf27d12a60451f0e13ceed34dda1a105b18d79383f0ef5237116d32d45ead01d0cb6ad41f7185ad664506ae44b9c79abba5de97372bd4a87357cd6c895780dcebe38410add118"], 0x48}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000054c0)=ANY=[@ANYBLOB="740000002400fbc7000000000000000200000000", @ANYRES32=r3, @ANYBLOB="00000000ffffffff00000000080001007366710048000229c6090032d0ed64f3c3545aaf6e000085a4e4ebb5ef6700"/96], 0x74}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="840000002c00010700"/20, @ANYRES32=r3, @ANYBLOB="0008008000000000030000000800010075333200580002001400050000000000000000000000000000000000400006003c0001000000000000000020898dde66057433b6ef3a41d22be225e0001b00000000000000000000000000000000100000000084e1a912c5998bcbf050000000000000000000000000000000798a3c067277da1a290b9613a33c575c36fad473382c8f5532ef3f0e1d2c450a7decbf3431a69f9b2ecb3291bed174245a962fe0484676958265e2988326a89db3139d91fe4aee6ae7e745abdfc21a9f61f2035979c1e3e9fea5b3958bc14fce6e66a36d1ab3194534ba4e973684b27793bff837d3"], 0x84}}, 0x0) r4 = socket(0x10, 0x80002, 0x0) sendmmsg$alg(r4, &(0x7f0000000180)=[{0x2, 0x1000000000000, &(0x7f0000000080), 0xe, &(0x7f0000000100)}], 0x492492492492642, 0x0) 00:19:05 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x2c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x2c}}, 0x0) 00:19:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket$inet(0x2, 0x1000000000000003, 0x29) r2 = socket$inet(0x2, 0x3, 0x19) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0xf5) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6=@rand_addr="00aa0000000d29cad380e4af3800"}, 0x0, @in=@local}}, 0xe8) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000580)=ANY=[@ANYBLOB="e0000002ac1414aa0000000001000000ac1414aafb2ca445505103961a6a3f0a3c3be28b8f2a7a27dfbd2fd98a258ff89ccdf9f21f7b57e8b7134e88769be97fecb488399a83cf32bb244509c3d0d007a72ae6c9471f24e8a3f93532bfb081e2d8cd39f6cc359fc75455da0b14b6f032625022b174a189b75a9f4df93700000096174b5b1fdbdcce12b4000000000032ae3efd5cfc9e9a4d1a8abcf3b9f12ba1c4a178ec9d62bec00c34ac1c80c28fa199cd4048916b2d"], 0x14) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) sendmsg$inet(r1, &(0x7f0000001640)={&(0x7f0000000140)={0x2, 0x0, @multicast2}, 0x10, 0x0}, 0x0) 00:19:05 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:06 executing program 2: r0 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newlink={0x2c, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_ADDRESS={0xa, 0x1, @empty=[0x2]}]}, 0x2c}}, 0x0) 00:19:06 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaacaaaa0000580000060000009078ac141400e00000020420880b0040000000000800000086dd080088be00000000100000000100000000000000080007eb0040000020000000025b2f1a556c972c66af00000000000000f5b9536f3200000000280065cad23844ee93f82bb8d4d662ef3215e1d91c574dd11a9080ce137e9bbf67bfcfa26515556c349c04431017ba22a2fcc52e9df0d9df3217a4868e0000ee40115943f7fcf61910d290591b08cafb5d479044923a620e6674bc1900fb942bf3ebda1f04112aec03346ae2b331d65bb9ba8bc6effa3e275daa79442ff833a6ceeb33605476a3f4e68bda8e23553f773e4393b252896eec7b058636886596ffb0cb419fe0490a54182876df9f91521e326d46476f567e70c1cc95602dac12b172ce2d58eddea79c56b898524a570da4e77a9e8e508f4f1fe406fa0b19015414bbc87f02eca9bfffffffffa17c205e7d6500000000004ab112e95fc82698885068f36cd9080f1315088e0c28acc20de40b8446d79aec608b372c1da7a412d8852b2214f3f2b7dcad27eaa837719e5f4687092fe5e4887a5e6a2cba1a1f7fb9b76d02e62c2b79e590d6302e3ea73f4a73a2a972ce8830c8f036e75be07f6435515d4fa5fc20940630a31c8555c7fcc969347ed1b1e137c1ceb74780e8558ca94987a73a75d30b48275ed8d5cbdb403943b47c138f052a46c8440ce6f36cac5fe4585de3514990fc7c60a506925a8d602a9942262819fa84c2c8b50000000000000000000000eb260f32834bc30c63ac52c58b301bba6e93b909952aefb1062b06e102a32babf206d317fc8095e2ea3670632ae24655737ac77556bbed6335e7ee561a9e45f791e9f1b11d811fe65cc5f248f24036f9f2f3eb22f81420b60f4e035b73b02079ef020572e58a3689f9f4a9630ec3ac580e2b92881b34517a5d2f9cc9363aa75a2025f8ae272e84b3034e115c424526910e6288ee7f7058d7480c9f"], 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) dup2(r0, r0) [ 390.395669][T10842] overlayfs: conflicting lowerdir path 00:19:06 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000080)={0x9f}) 00:19:06 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:06 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x195f, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4c20, 0x0, @mcast2}, 0x1c) 00:19:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netlink(r0, 0x10e, 0x3, &(0x7f00007e0000)=""/4, &(0x7f0000000000)=0x4) 00:19:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$netlink(r0, 0x10e, 0x5, &(0x7f00007e0000)=""/4, &(0x7f0000000000)=0x4) 00:19:06 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaacaaaa0000580000060000009078ac141400e00000020420880b0040000000000800000086dd080088be00000000100000000100000000000000080007eb0040000020000000025b2f1a556c972c66af00000000000000f5b9536f3200000000280065cad23844ee93f82bb8d4d662ef3215e1d91c574dd11a9080ce137e9bbf67bfcfa26515556c349c04431017ba22a2fcc52e9df0d9df3217a4868e0000ee40115943f7fcf61910d290591b08cafb5d479044923a620e6674bc1900fb942bf3ebda1f04112aec03346ae2b331d65bb9ba8bc6effa3e275daa79442ff833a6ceeb33605476a3f4e68bda8e23553f773e4393b252896eec7b058636886596ffb0cb419fe0490a54182876df9f91521e326d46476f567e70c1cc95602dac12b172ce2d58eddea79c56b898524a570da4e77a9e8e508f4f1fe406fa0b19015414bbc87f02eca9bfffffffffa17c205e7d6500000000004ab112e95fc82698885068f36cd9080f1315088e0c28acc20de40b8446d79aec608b372c1da7a412d8852b2214f3f2b7dcad27eaa837719e5f4687092fe5e4887a5e6a2cba1a1f7fb9b76d02e62c2b79e590d6302e3ea73f4a73a2a972ce8830c8f036e75be07f6435515d4fa5fc20940630a31c8555c7fcc969347ed1b1e137c1ceb74780e8558ca94987a73a75d30b48275ed8d5cbdb403943b47c138f052a46c8440ce6f36cac5fe4585de3514990fc7c60a506925a8d602a9942262819fa84c2c8b50000000000000000000000eb260f32834bc30c63ac52c58b301bba6e93b909952aefb1062b06e102a32babf206d317fc8095e2ea3670632ae24655737ac77556bbed6335e7ee561a9e45f791e9f1b11d811fe65cc5f248f24036f9f2f3eb22f81420b60f4e035b73b02079ef020572e58a3689f9f4a9630ec3ac580e2b92881b34517a5d2f9cc9363aa75a2025f8ae272e84b3034e115c424526910e6288ee7f7058d7480c9f"], 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 00:19:06 executing program 1: r0 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) socket(0x0, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) write$9p(r0, &(0x7f0000001400)="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", 0x600) sendfile(r0, r1, 0x0, 0x10003) [ 390.740657][T10862] overlayfs: conflicting lowerdir path 00:19:06 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000080)="a797f61b09", 0x5}], 0x1) r2 = open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) 00:19:06 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:06 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 00:19:06 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 390.898376][ T27] audit: type=1804 audit(1582157946.473:53): pid=10875 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/root/syzkaller-testdir364196792/syzkaller.hTobHo/81/file0" dev="sda1" ino=16860 res=1 00:19:06 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) socket$inet6(0xa, 0x0, 0x0) [ 391.031311][ T27] audit: type=1804 audit(1582157946.603:54): pid=10881 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir102534664/syzkaller.6Yr0A1/33/bus" dev="sda1" ino=16847 res=1 [ 391.100782][T10886] overlayfs: conflicting lowerdir path 00:19:06 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 391.188617][T10895] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:06 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t~-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 00:19:06 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 391.317319][T10901] overlayfs: conflicting lowerdir path [ 391.348940][ T27] audit: type=1804 audit(1582157946.923:55): pid=10895 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/88/file0/bus" dev="loop2" ino=51 res=1 00:19:07 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:07 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:07 executing program 1: perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000180)='cpu\t~-6\n\x00\xff\x00\xdc.\xdf\xbbk\xad\x1b\xf3\xf6_|S\x93>\xb4\x15#b\x91\xec\xf2\x12\xbb\xd0\xcd0\xa4\xda\xa8\xe1o+\xbd}EV\xba0\xae\xee(4\xe4\x8d\x17\b\xa7\xb04G\xc28\xfb\x19\x94\xdf\x11JE\x02\x98Pm\x0f(\x98\xff\x05[\xd9\xad|\xa3\xc9Y~\xf4\xf7\xf9F\x9c\xf0\x83H\xb5\x12\xdeM\x802\x1f\xa6\x8a\x89\x1c') 00:19:07 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 391.731978][T10920] overlayfs: conflicting lowerdir path [ 391.805421][ T27] audit: type=1804 audit(1582157947.383:56): pid=10888 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir102534664/syzkaller.6Yr0A1/33/bus" dev="sda1" ino=16847 res=1 [ 391.832896][ T27] audit: type=1804 audit(1582157947.383:57): pid=10888 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.3" name="/root/syzkaller-testdir102534664/syzkaller.6Yr0A1/33/bus" dev="sda1" ino=16847 res=1 [ 391.913402][ T27] audit: type=1804 audit(1582157947.403:58): pid=10888 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir102534664/syzkaller.6Yr0A1/33/bus" dev="sda1" ino=16847 res=1 00:19:07 executing program 3: preadv(0xffffffffffffffff, &(0x7f00000024c0)=[{&(0x7f0000000100)=""/86, 0x56}, {0x0}], 0x2, 0x0) syz_open_procfs(0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = open(&(0x7f0000103ff8)='./file0\x00', 0x149042, 0x0) ftruncate(r3, 0x1000) r4 = open(&(0x7f0000103ff8)='./file0\x00', 0x0, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x806, 0x0) sendfile(r5, r4, 0x0, 0x40801001) readv(r5, &(0x7f0000000100)=[{&(0x7f0000000080)=""/4, 0x4}], 0x2dc) 00:19:07 executing program 0: socket$packet(0x11, 0x0, 0x300) syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 391.953960][ T27] audit: type=1800 audit(1582157947.463:59): pid=10907 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.2" name="bus" dev="loop2" ino=51 res=0 [ 391.973474][ T27] audit: type=1804 audit(1582157947.513:60): pid=10907 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/88/file0/bus" dev="loop2" ino=51 res=1 00:19:07 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:07 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 392.013023][ T27] audit: type=1804 audit(1582157947.513:61): pid=10927 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/88/file0/bus" dev="loop2" ino=51 res=1 [ 392.122247][ T27] audit: type=1804 audit(1582157947.693:62): pid=10942 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir102534664/syzkaller.6Yr0A1/34/file0" dev="sda1" ino=16858 res=1 00:19:07 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) socket$inet6(0xa, 0x0, 0x0) 00:19:07 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:07 executing program 1: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) r3 = socket$inet6(0xa, 0x800000000000002, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socket(0x0, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 00:19:07 executing program 0: socket$packet(0x11, 0x0, 0x300) syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 392.243928][ T7] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 392.282271][T10948] overlayfs: conflicting lowerdir path 00:19:07 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:08 executing program 0: socket$packet(0x11, 0x0, 0x300) syz_emit_ethernet(0x66, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaacaaaa0000580000060000009078ac141400e00000020420880b0040000000000800000086dd080088be00000000100000000100000000000000080007eb0040000020000000025b2f1a556c972c66af00000000000000f5b9536f3200000000280065cad23844ee93f82bb8d4d662ef3215e1d91c574dd11a9080ce137e9bbf67bfcfa26515556c349c04431017ba22a2fcc52e9df0d9df3217a4868e0000ee40115943f7fcf61910d290591b08cafb5d479044923a620e6674bc1900fb942bf3ebda1f04112aec03346ae2b331d65bb9ba8bc6effa3e275daa79442ff833a6ceeb33605476a3f4e68bda8e23553f773e4393b252896eec7b058636886596ffb0cb419fe0490a54182876df9f91521e326d46476f567e70c1cc95602dac12b172ce2d58eddea79c56b898524a570da4e77a9e8e508f4f1fe406fa0b19015414bbc87f02eca9bfffffffffa17c205e7d6500000000004ab112e95fc82698885068f36cd9080f1315088e0c28acc20de40b8446d79aec608b372c1da7a412d8852b2214f3f2b7dcad27eaa837719e5f4687092fe5e4887a5e6a2cba1a1f7fb9b76d02e62c2b79e590d6302e3ea73f4a73a2a972ce8830c8f036e75be07f6435515d4fa5fc20940630a31c8555c7fcc969347ed1b1e137c1ceb74780e8558ca94987a73a75d30b48275ed8d5cbdb403943b47c138f052a46c8440ce6f36cac5fe4585de3514990fc7c60a506925a8d602a9942262819fa84c2c8b50000000000000000000000eb260f32834bc30c63ac52c58b301bba6e93b909952aefb1062b06e102a32babf206d317fc8095e2ea3670632ae24655737ac77556bbed6335e7ee561a9e45f791e9f1b11d811fe65cc5f248f24036f9f2f3eb22f81420b60f4e035b73b02079ef020572e58a3689f9f4a9630ec3ac580e2b92881b34517a5d2f9cc9363aa75a2025f8ae272e84b3034e115c424526910e6288ee7f7058d7480c9f"], 0x0) 00:19:08 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x0, 0x0, 0x0) [ 392.517417][T10962] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:08 executing program 3: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) socket$inet6(0xa, 0x0, 0x0) 00:19:08 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x0, 0x0, 0x0) 00:19:08 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 392.697991][T10973] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 392.945531][T10983] overlayfs: conflicting lowerdir path [ 393.215148][ T2522] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) [ 393.258479][ T2522] FAT-fs (loop3): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 00:19:10 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:10 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x0, 0x0, 0x0) 00:19:10 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:10 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) socket$inet6(0xa, 0x0, 0x0) 00:19:10 executing program 1: mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) chmod(&(0x7f0000000080)='./bus\x00', 0x5e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr$security_capability(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f0000000580)=@v2, 0x14, 0x0) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) 00:19:10 executing program 3: mknod(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) chmod(&(0x7f0000000080)='./bus\x00', 0x5e) lstat(&(0x7f0000000340)='./bus\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r0, r1, 0x0) execve(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) [ 395.163514][T11000] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:10 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x0, &(0x7f0000000340)=ANY=[], 0x0) 00:19:10 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth0_to_hsr\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1}, 0x14) sendto$inet6(r0, &(0x7f0000000280)="0503002c8906483c00000200c52cf7c25975e605b02f0800eb2b2ff0dac8897c6b118777faffffff306609000000c5471d130a66321a54e7df305f80a88161b6fd8f24286a57c3feffff", 0x1005a, 0x800, 0x0, 0x2f) 00:19:10 executing program 3: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x6100) r1 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ftruncate(r1, 0x8200) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x2, 0x0, 0xedf}) r4 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r4, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f0000004800)) r5 = open(&(0x7f0000001840)='./bus\x00', 0x0, 0x0) sendfile(r0, r5, 0x0, 0x8000fffffffa) 00:19:10 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(0x0, &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:11 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x0, &(0x7f0000000340)=ANY=[], 0x0) 00:19:11 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x0, &(0x7f0000000340)=ANY=[], 0x0) [ 395.657403][T11037] overlayfs: conflicting lowerdir path [ 395.832457][ T2522] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 00:19:13 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:13 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) mount$bpf(0x0, &(0x7f0000000480)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000100)='./file0\x00', 0x0, 0x5890, 0x0) 00:19:13 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xfffffffffffffd4e}], 0x1000000000000320, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@rand_addr="cbc0515083378f261ca4efe271f011c8", 0xbb}) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/73, 0xffffffffffffff15}], 0x0, 0x0, 0x15d, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) 00:19:13 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:13 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) socket$inet6(0xa, 0x0, 0x0) 00:19:13 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0) 00:19:13 executing program 1: gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) modify_ldt$write2(0x11, &(0x7f00000001c0)={0x0, 0x20000000, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x1, 0x4, 0x100000001}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0xb, 0x40, 0x401}, &(0x7f0000000380)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x1}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) ioctl$PPPIOCGNPMODE(r3, 0xc008744c, &(0x7f0000000200)={0xc023, 0x3}) 00:19:13 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0) [ 398.246798][T11050] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:13 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0) 00:19:14 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0x0, 0x2}, 0x20) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) sendmsg$BATADV_CMD_GET_MESH(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, 0x0) 00:19:14 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 398.511140][ T27] kauditd_printk_skb: 6 callbacks suppressed [ 398.511160][ T27] audit: type=1804 audit(1582157954.083:69): pid=11050 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/91/file0/bus" dev="loop2" ino=55 res=1 00:19:14 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 398.994810][ T21] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 00:19:16 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:16 executing program 1: gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) modify_ldt$write2(0x11, &(0x7f00000001c0)={0x0, 0x20000000, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x1, 0x4, 0x100000001}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0xb, 0x40, 0x401}, &(0x7f0000000380)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x1}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) ioctl$PPPIOCGNPMODE(r3, 0xc008744c, &(0x7f0000000200)={0xc023, 0x3}) 00:19:16 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaacaaaa0000580000060000009078ac141400e00000020420880b0040000000000800000086dd080088be00000000100000000100000000000000080007eb0040000020000000025b2f1a556c972c66af00000000000000f5b9536f3200000000280065cad23844ee93f82bb8d4d662ef3215e1d91c574dd11a9080ce137e9bbf67bfcfa26515556c349c04431017ba22a2fcc52e9df0d9df3217a4868e0000ee40115943f7fcf61910d290591b08cafb5d479044923a620e6674bc1900fb942bf3ebda1f04112aec03346ae2b331d65bb9ba8bc6effa3e275daa79442ff833a6ceeb33605476a3f4e68bda8e23553f773e4393b252896eec7b058636886596ffb0cb419fe0490a54182876df9f91521e326d46476f567e70c1cc95602dac12b172ce2d58eddea79c56b898524a570da4e77a9e8e508f4f1fe406fa0b19015414bbc87f02eca9bfffffffffa17c205e7d6500000000004ab112e95fc82698"], 0x0) 00:19:16 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', 0x0, &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:16 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:16 executing program 3: gettid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) modify_ldt$write2(0x11, &(0x7f00000001c0)={0x0, 0x20000000, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fe1000)={0x5, 0x83, 0x80, 0xf}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x9, 0x1, 0x80, 0x400}, 0x3c) r2 = bpf$MAP_CREATE(0x0, &(0x7f00004f9fe4)={0x9, 0x1, 0x4, 0x100000001}, 0x3c) bpf$PROG_LOAD(0x5, &(0x7f0000fed000)={0x7, 0x9, &(0x7f00000000c0)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, r0}, @map={0x18, 0x0, 0x1, 0x0, r1}, @map={0x18, 0x0, 0x1, 0x0, r2}]}, &(0x7f0000919ff6)='syzkaller\x00', 0x0, 0xe1, &(0x7f0000000000)=""/225}, 0x14) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000004c0)={0xffffffffffffffff, 0xc0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={0x0, 0xb, 0x40, 0x401}, &(0x7f0000000380)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=0x1}}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x4) ioctl$PPPIOCGNPMODE(r3, 0xc008744c, &(0x7f0000000200)={0xc023, 0x3}) [ 401.347454][T11101] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:17 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 401.379515][ T27] audit: type=1804 audit(1582157956.953:70): pid=11101 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/92/file0/bus" dev="loop2" ino=56 res=1 00:19:17 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:17 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000280)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000380)="e3f80195fda2bb7dd1ca7baf", 0xc}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:19:17 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in, 0x0, 0x2b}, 0x0, @in=@empty}}, 0xe8) r1 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000001c0), 0x4) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="020b0001020000000000400000000000"], 0x10}}, 0x0) sendmsg$key(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="02120000020000000a00eba9213ecb73"], 0x10}}, 0x0) recvmmsg(r1, &(0x7f0000000f00), 0x274, 0x10000, &(0x7f0000001000)={0x77359400}) close(r1) 00:19:17 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 401.967827][ T21] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 00:19:20 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:20 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:20 executing program 3: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000600)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000300)=""/101, 0x65}], 0x1, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000740)=[{&(0x7f0000000480)=""/164, 0xa4}], 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1e}}, 0x50) write$FUSE_OPEN(r0, &(0x7f0000000000)={0x20, 0x0, 0x2}, 0x20) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) 00:19:20 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:20 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 404.505644][T11143] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:20 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaacaaaa0000580000060000009078ac141400e00000020420880b0040000000000800000086dd080088be00000000100000000100000000000000080007eb0040000020000000025b2f1a556c972c66af00000000000000f5b9536f3200000000280065cad23844ee93f82bb8d4d662ef3215e1d91c574dd11a9080ce137e9bbf67bfcfa26515556c349c04431017ba22a2fcc52e9df0d9df3217a4868e0000ee40115943f7fcf61910d290591b08cafb5d479044923a620e6674bc1900fb942bf3ebda1f04112aec03346ae2b331d65bb9ba8bc6effa3e275daa79442ff833a6ceeb33605476a3f4e68bda8e23553f773e4393b252896eec7b058636886596ffb0cb419fe0490a54182876df9f91521e326d46476f567e70c1cc95602dac12b172ce2d58eddea79c56b898524a570da4e77a9e8e508f4f1fe406fa0b19015414bbc87f02eca9bfffffffffa17c205e7d6500000000004ab112e95fc82698885068f36cd9080f1315088e0c28acc20de40b8446d79aec608b372c1da7a412d8852b2214f3f2b7dcad27eaa837719e5f4687092fe5e4887a5e6a2cba1a1f7fb9b76d02e62c2b79e590d6302e3ea73f4a73a2a972ce8830c8f036e75be07f6435515d4fa5fc20940630a31c8555c7fcc969347ed1b1e137c1ceb74780e8558ca94987a73a75d30b48275ed8d5cbdb403943b47c138f052a46c8440ce6f36cac5fe4585de3514990fc7c60a506925a8d602a9942262819fa84c2c8b50000000000000000000000eb260f32834bc30c63ac52c58b301bba6e93b909952aefb1062b06e102a32babf206d317fc8095e2ea3670632ae24655737ac77556bbed6335e7ee561a9e45f791e9f1"], 0x0) [ 404.598674][ T27] audit: type=1804 audit(1582157960.173:71): pid=11143 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/93/file0/bus" dev="loop2" ino=57 res=1 00:19:20 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', 0x0, 0x0, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:20 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:20 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:20 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r1, &(0x7f0000000040), 0x12) [ 404.792061][ T7] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 404.821779][T11156] overlayfs: conflicting lowerdir path 00:19:20 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:20 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}], {}, [{}, {}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 404.951348][T11165] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 405.021335][ T27] audit: type=1804 audit(1582157960.593:72): pid=11165 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/94/file0/bus" dev="loop2" ino=58 res=1 [ 405.096975][T11171] overlayfs: conflicting lowerdir path [ 405.143019][ T21] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 407.114091][ T0] NOHZ: local_softirq_pending 08 00:19:23 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:23 executing program 1: mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) madvise(&(0x7f00009d6000/0x600000)=nil, 0x600000, 0x3) dup2(0xffffffffffffffff, 0xffffffffffffffff) 00:19:23 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:23 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:23 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}], {}, [{}, {}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:23 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 407.620810][T11186] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:23 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:23 executing program 1: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000080)='./file0\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000500)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000100)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000600), 0x12) [ 407.713015][ T27] audit: type=1804 audit(1582157963.283:73): pid=11186 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/95/file0/bus" dev="loop2" ino=59 res=1 00:19:23 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaacaaaa0000580000060000009078ac141400e00000020420880b0040000000000800000086dd080088be00000000100000000100000000000000080007eb0040000020000000025b2f1a556c972c66af00000000000000f5b9536f3200000000280065cad23844ee93f82bb8d4d662ef3215e1d91c574dd11a9080ce137e9bbf67bfcfa26515556c349c04431017ba22a2fcc52e9df0d9df3217a4868e0000ee40115943f7fcf61910d290591b08cafb5d479044923a620e6674bc1900fb942bf3ebda1f04112aec03346ae2b331d65bb9ba8bc6effa3e275daa79442ff833a6ceeb33605476a3f4e68bda8e23553f773e4393b252896eec7b058636886596ffb0cb419fe0490a54182876df9f91521e326d46476f567e70c1cc95602dac12b172ce2d58eddea79c56b898524a570da4e77a9e8e508f4f1fe406fa0b19015414bbc87f02eca9bfffffffffa17c205e7d6500000000004ab112e95fc82698885068f36cd9080f1315088e0c28acc20de40b8446d79aec608b372c1da7a412d8852b2214f3f2b7dcad27eaa837719e5f4687092fe5e4887a5e6a2cba1a1f7fb9b76d02e62c2b79e590d6302e3ea73f4a73a2a972ce8830c8f036e75be07f6435515d4fa5fc20940630a31c8555c7fcc969347ed1b1e137c1ceb74780e8558ca94987a73a75d30b48275ed8d5cbdb403943b47c138f052a46c8440ce6f36cac5fe4585de3514990fc7c60a506925a8d602a9942262819fa84c2c8b50000000000000000000000eb260f32834bc30c63ac52c58b301bba6e93b909952aefb1062b06e102a32babf206d317fc8095e2ea3670632ae24655737ac77556bbed6335e7ee561a9e45f791e9f1b11d811fe65cc5f248f24036f9f2f3eb22f81420b60f4e035b73b02079ef020572e58a3689f9f4a9630ec3ac"], 0x0) 00:19:23 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}], {}, [{}, {}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:23 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:23 executing program 1: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/thread-self\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000280)) [ 407.900424][ T21] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 408.073452][T11215] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 408.080920][T11214] overlayfs: conflicting lowerdir path [ 408.221638][ T21] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:26 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:26 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaacaaaa0000580000060000009078ac141400e00000020420880b0040000000000800000086dd080088be00000000100000000100000000000000080007eb0040000020000000025b2f1a556c972c66af00000000000000f5b9536f3200000000280065cad23844ee93f82bb8d4d662ef3215e1d91c574dd11a9080ce137e9bbf67bfcfa26515556c349c04431017ba22a2fcc52e9df0d9df3217a4868e0000ee40115943f7fcf61910d290591b08cafb5d479044923a620e6674bc1900fb942bf3ebda1f04112aec03346ae2b331d65bb9ba8bc6effa3e275daa79442ff833a6ceeb33605476a3f4e68bda8e23553f773e4393b252896eec7b058636886596ffb0cb419fe0490a54182876df9f91521e326d46476f567e70c1cc95602dac12b172ce2d58eddea79c56b898524a570da4e77a9e8e508f4f1fe406fa0b19015414bbc87f02eca9bfffffffffa17c205e7d6500000000004ab112e95fc82698885068f36cd9080f1315088e0c28acc20de40b8446d79aec608b372c1da7a412d8852b2214f3f2b7dcad27eaa837719e5f4687092fe5e4887a5e6a2cba1a1f7fb9b76d02e62c2b79e590d6302e3ea73f4a73a2a972ce8830c8f036e75be07f6435515d4fa5fc20940630a31c8555c7fcc969347ed1b1e137c1ceb74780e8558ca94987a73a75d30b48275ed8d5cbdb403943b47c138f052a46c8440ce6f36cac5fe4585de3514990fc7c60a506925a8d602a9942262819fa84c2c8b50000000000000000000000eb260f32834bc30c63ac52c58b301bba6e93b909952aefb1062b06e102a32babf206d317fc8095e2ea3670632ae24655737ac77556bbed6335e7ee561a9e45f791e9f1b11d811fe65cc5f248f24036f9f2f3eb22f81420b60f4e035b73b02079ef020572e58a3689f9f4a9630ec3ac580e2b92881b34517a5d2f9cc9363aa75a2025f8ae27"], 0x0) 00:19:26 executing program 1: 00:19:26 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}], {}, [{}, {}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:26 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:26 executing program 3: 00:19:26 executing program 3: 00:19:26 executing program 1: [ 410.808214][T11229] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:26 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:26 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:26 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}], {}, [{}, {}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:26 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0xfffffffffffffd4e}], 0x1000000000000320, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f00000000c0)={@rand_addr="cbc0515083378f261ca4efe271f011c8", 0xbb}) ptrace$setopts(0x4206, r2, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140)=""/73, 0xffffffffffffff15}], 0x0, 0x0, 0x15d, 0x0) tkill(r2, 0x3c) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) [ 411.099295][T11246] overlayfs: conflicting lowerdir path [ 411.167364][ T2522] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 413.515974][ T0] NOHZ: local_softirq_pending 08 [ 413.521248][ T0] NOHZ: local_softirq_pending 08 00:19:29 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:29 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:29 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) sendfile(r2, 0xffffffffffffffff, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:29 executing program 1: 00:19:29 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}], {}, [{}, {}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 413.809795][T11267] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:29 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:29 executing program 1: 00:19:29 executing program 1: 00:19:29 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) [ 414.058039][ T2522] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:29 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:29 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:29 executing program 1: 00:19:29 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 414.236741][T11289] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 414.311819][T11288] overlayfs: workdir and upperdir must reside under the same mount [ 414.328150][ T27] audit: type=1804 audit(1582157969.903:74): pid=11289 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/99/file0/bus" dev="loop2" ino=63 res=1 [ 414.443139][ T7] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:32 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:32 executing program 1: 00:19:32 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:32 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:32 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) [ 416.907334][T11303] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:32 executing program 1: [ 416.954432][ T27] audit: type=1804 audit(1582157972.533:75): pid=11303 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/100/file0/bus" dev="loop2" ino=64 res=1 00:19:32 executing program 1: 00:19:32 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 417.166524][ T2522] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:32 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:32 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)) r3 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:32 executing program 1: 00:19:32 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 417.356513][T11326] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 417.469429][ T27] audit: type=1804 audit(1582157973.043:76): pid=11326 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/101/file0/bus" dev="loop2" ino=65 res=1 [ 417.589555][ T2655] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:35 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:35 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:35 executing program 1: 00:19:35 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:35 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:35 executing program 1: [ 420.066257][T11342] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 420.101563][ T27] audit: type=1804 audit(1582157975.673:77): pid=11342 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/102/file0/bus" dev="loop2" ino=66 res=1 00:19:35 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:35 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 420.208941][ T2655] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 420.365433][T11359] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:36 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:36 executing program 1: 00:19:36 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:36 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) [ 420.406002][ T27] audit: type=1804 audit(1582157975.983:78): pid=11359 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/103/file0/bus" dev="loop2" ino=67 res=1 [ 420.455942][ T2522] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 420.637798][T11372] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 420.689711][ T27] audit: type=1804 audit(1582157976.263:79): pid=11372 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/104/file0/bus" dev="loop2" ino=68 res=1 [ 420.726658][ T7] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:38 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:38 executing program 1: 00:19:38 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:38 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:38 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:38 executing program 1: 00:19:38 executing program 1: [ 423.330930][T11384] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:39 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 423.459759][ T27] audit: type=1804 audit(1582157979.033:80): pid=11384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/105/file0/bus" dev="loop2" ino=69 res=1 00:19:39 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:39 executing program 1: 00:19:39 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:39 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) [ 423.641120][ T7] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:41 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:41 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:41 executing program 1: 00:19:41 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaacaaaa0000580000060000009078ac141400e00000020420880b0040000000000800000086dd080088be00000000100000000100000000000000080007eb0040000020000000025b2f1a556c972c66af00000000000000f5b9536f3200000000280065cad23844ee93f82bb8d4d662ef3215e1d91c574dd11a9080ce137e9bbf67bfcfa26515556c349c04431017ba22a2fcc52e9df0d9df3217a4868e0000ee40115943f7fcf61910d290591b08cafb5d479044923a620e6674bc1900fb942bf3ebda1f04112aec03346ae2b331d65bb9ba8bc6effa3e275daa79442ff833a6ceeb33605476a3f4e68bda8e23553f773e4393b252896eec7b058636886596ffb0cb419fe0490a54182876df9f91521e326d46476f567e70c1cc95602dac12b172ce2d58eddea79c56b898524a570da4e77a9e8e508f4f1fe406fa0b19015414bbc87f02eca9bfffffffffa17c205e7d6500000000004ab112e95fc82698885068f36cd9080f1315088e0c28acc20de40b8446d79aec608b372c1da7a412d8852b2214f3f2b7dcad27eaa837719e5f4687092fe5e4887a5e6a2cba1a1f7fb9b76d02e62c2b79e590d6302e3ea73f4a73a2a972ce8830c8f036e75be07f6435515d4fa5fc20940630a31c8555c7fcc969347ed1b1e137c1ceb74780e8558ca94987a73a75d30b48275ed8d5cbdb403943b47c138f052a46c8440ce6f36cac5fe4585de3514990fc7c60a506925a8d602a9942262819fa84c2c8b50000000000000000000000eb260f32834bc30c63ac52c58b301bba6e93b909952aefb1062b06e102a32babf206d317fc8095e2ea3670632ae24655737ac77556bbed6335e7ee561a9e45f791e9f1b11d811fe65cc5f248f24036f9f2f3eb22f81420b60f4e035b73b02079ef020572e58a3689f9f4a9630ec3ac580e2b92881b34517a5d2f9cc9363aa75a2025f8ae272e84b3034e115c424526910e6288ee7f7058d7480c"], 0x0) 00:19:41 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:41 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:41 executing program 1: [ 426.400700][T11424] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:42 executing program 1: 00:19:42 executing program 0: socket$packet(0x11, 0x80a, 0x300) syz_emit_ethernet(0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x0) 00:19:42 executing program 1: [ 426.515775][ T27] audit: type=1804 audit(1582157982.093:81): pid=11432 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/106/file0/bus" dev="sda1" ino=16961 res=1 00:19:42 executing program 1: 00:19:42 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 427.593552][ T0] NOHZ: local_softirq_pending 08 00:19:44 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:44 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r4, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:44 executing program 0: 00:19:44 executing program 1: 00:19:44 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:44 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:45 executing program 0: [ 429.422862][T11452] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:45 executing program 0: [ 429.468299][ T27] audit: type=1804 audit(1582157985.043:82): pid=11452 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/107/file0/bus" dev="loop2" ino=70 res=1 00:19:45 executing program 1: 00:19:45 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r2, 0x4200, 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:45 executing program 0: [ 429.598671][T11461] overlayfs: conflicting lowerdir path [ 429.635178][ T7] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:45 executing program 0: [ 429.828626][T11473] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 429.916890][ T27] audit: type=1804 audit(1582157985.493:83): pid=11473 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/108/file0/bus" dev="loop2" ino=71 res=1 [ 430.137899][ T8096] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 00:19:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:48 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:48 executing program 1: 00:19:48 executing program 0: 00:19:48 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:48 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:48 executing program 0: 00:19:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) [ 432.681253][T11492] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:48 executing program 0: 00:19:48 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:48 executing program 1: [ 432.816486][ T27] audit: type=1804 audit(1582157988.393:84): pid=11492 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/109/file0/bus" dev="loop2" ino=72 res=1 00:19:48 executing program 0: 00:19:48 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:48 executing program 1: 00:19:48 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) [ 433.043151][ T8096] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:48 executing program 0: [ 433.263736][T11523] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 433.328036][ T27] audit: type=1804 audit(1582157988.903:85): pid=11523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/110/file0/bus" dev="loop2" ino=73 res=1 [ 433.421564][ T7] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:51 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:51 executing program 1: 00:19:51 executing program 0: 00:19:51 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:51 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) r3 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r4, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x10000}]) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r2, r5, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) [ 435.679672][T11535] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 435.769499][ T27] audit: type=1804 audit(1582157991.343:86): pid=11535 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/111/file0/bus" dev="loop2" ino=74 res=1 00:19:51 executing program 1: 00:19:51 executing program 0: 00:19:51 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:51 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:51 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) [ 435.899794][ T2522] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:51 executing program 1: [ 436.045372][T11554] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:51 executing program 0: [ 436.078979][ T27] audit: type=1804 audit(1582157991.653:87): pid=11554 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/112/file0/bus" dev="loop2" ino=75 res=1 [ 436.201952][ T2522] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:54 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:54 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:54 executing program 1: 00:19:54 executing program 0: 00:19:54 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 438.733475][T11565] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:54 executing program 0: [ 438.771872][ T27] audit: type=1804 audit(1582157994.343:88): pid=11565 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/113/file0/bus" dev="loop2" ino=76 res=1 00:19:54 executing program 1: [ 438.875951][T11574] overlayfs: conflicting lowerdir path [ 438.928158][ T2655] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:54 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:54 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) lseek(0xffffffffffffffff, 0x4200, 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x8400fffffffb) sendfile(r1, r1, 0x0, 0x8080fffffffe) 00:19:54 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}]}, 0x54, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:54 executing program 0: 00:19:54 executing program 1: [ 439.109562][T11586] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 439.231329][ T27] audit: type=1804 audit(1582157994.803:89): pid=11586 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/114/file0/bus" dev="loop2" ino=77 res=1 [ 439.373072][ T8096] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:57 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:57 executing program 0: 00:19:57 executing program 1: 00:19:57 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:57 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) 00:19:57 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 441.836859][T11604] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:19:57 executing program 1: [ 441.926371][ T27] audit: type=1804 audit(1582157997.503:90): pid=11604 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/115/file0/bus" dev="loop2" ino=78 res=1 00:19:57 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:19:57 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:19:57 executing program 1: 00:19:57 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) 00:19:57 executing program 0: [ 442.118865][ T8096] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 442.318454][T11629] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 442.391303][ T27] audit: type=1804 audit(1582157997.963:91): pid=11629 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/116/file0/bus" dev="loop2" ino=79 res=1 [ 442.592932][ T2655] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 00:20:00 executing program 1: 00:20:00 executing program 0: 00:20:00 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:20:00 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8080fffffffe) 00:20:00 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) [ 444.925714][T11637] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 444.952471][ T27] audit: type=1804 audit(1582158000.523:92): pid=11637 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/117/file0/bus" dev="loop2" ino=80 res=1 00:20:00 executing program 1: 00:20:00 executing program 0: [ 445.201477][ T2655] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x0000007a (sector = 1) 00:20:00 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x6a}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:20:00 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:20:00 executing program 1: 00:20:00 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) 00:20:00 executing program 0: 00:20:00 executing program 1: [ 445.516299][T11669] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 445.570983][ T27] audit: type=1804 audit(1582158001.143:93): pid=11669 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/118/bus" dev="sda1" ino=16593 res=1 [ 446.156135][ T0] NOHZ: local_softirq_pending 08 00:20:03 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x68}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/57}], 0xfffffffffffffcaa, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/handlers\x00', 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:20:03 executing program 0: 00:20:03 executing program 4: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) keyctl$chown(0x12, 0x0, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f00000009c0)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$system_posix_acl(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)='system.posix_acl_default\x00', &(0x7f0000000c40)={{}, {}, [{}, {}], {}, [{}, {}, {}, {}, {}]}, 0x5c, 0x0) mount$overlay(0x40000a, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}], [], 0xf603000000000000}) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) creat(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000600)={{{@in6=@loopback, @in6=@empty}}, {{}, 0x0, @in6=@local}}, 0x0) keyctl$chown(0x4, 0x0, 0x0, 0x0) statx(0xffffffffffffff9c, &(0x7f0000000880)='./file0\x00', 0x400, 0xfff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socket(0x10, 0x2, 0x0) add_key$keyring(&(0x7f00000004c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) keyctl$chown(0x4, 0x0, 0x0, 0x0) getegid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000cab000)) add_key$keyring(&(0x7f00000004c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, 0x0, 0x202002) setxattr$system_posix_acl(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000380)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB="02000100", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYBLOB="0200", @ANYBLOB, @ANYBLOB, @ANYRES32, @ANYBLOB="08000200", @ANYRES32, @ANYBLOB="080005", @ANYRES32=r0, @ANYBLOB='\b\x00', @ANYBLOB, @ANYBLOB="f591e11fdfbf5aa297cec65cf32a0b4a295aaef51890b86f1f115b31ae5fe77bf071a3b0be72338516d6fb597465d1f4710ccae9c7809a13d9e060a73e4aa18a089f2656505528fdc26e81ac11df7392a90c10f56bd9bea1db55e6855b07c48881602aa085eaec60a6ef42ab6af6325a395c9ad422c3e657c2f42ffc0b344117a64dd641968f8a4578653492c48dca83e9ebbd1284470e3a80d55c4cd96e65307a9e928cb0b129c991c4ae49f8c6626009217c4eb3508bc9f54287d76053e9ac9d11c59d2a8f1ff3d5436507b7193d8b87357bcc38eb54444f875f1dd0253826e783a6d5a6c2b20e002aef4413", @ANYBLOB='\b', @ANYRES32, @ANYBLOB="10000100c6d5cc003cc7e4ab927b0000000020000400"], 0x16, 0x0) 00:20:03 executing program 1: 00:20:03 executing program 2: setsockopt$IP_VS_SO_SET_EDITDEST(0xffffffffffffffff, 0x0, 0x489, &(0x7f0000000080)={{0x0, @dev, 0x0, 0x0, 'rr\x00', 0x0, 0x7}, {@empty}}, 0x44) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f0000000380)='./file0\x00', 0x1000000, 0x1, &(0x7f0000000000)=[{&(0x7f0000000080)="eb3c906d6b66732e666174000204010002000270fff8", 0x268}], 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) lseek(r1, 0x4200, 0x0) r2 = creat(&(0x7f0000000240)='./bus\x00', 0x0) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) r4 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x8400fffffffb) sendfile(r0, r0, 0x0, 0x8080fffffffe) [ 448.000016][T11679] FAT-fs (loop2): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 00:20:03 executing program 1: [ 448.117744][ T27] audit: type=1804 audit(1582158003.693:94): pid=11679 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir761075171/syzkaller.bl3Zu1/119/bus" dev="sda1" ino=17041 res=1 [ 448.372137][T11679] ================================================================== [ 448.380286][T11679] BUG: KCSAN: data-race in ext4_ext_insert_extent / ext4_mark_iloc_dirty [ 448.388683][T11679] [ 448.391003][T11679] write to 0xffff88812513bb32 of 2 bytes by task 11691 on cpu 1: [ 448.398714][T11679] ext4_ext_insert_extent+0x8b9/0x25f0 [ 448.404166][T11679] ext4_ext_map_blocks+0xc52/0x2320 [ 448.409578][T11679] ext4_map_blocks+0x23a/0xdb0 [ 448.414446][T11679] ext4_writepages+0x108b/0x1d40 [ 448.419380][T11679] do_writepages+0x6b/0x170 [ 448.423870][T11679] __filemap_fdatawrite_range+0x1c5/0x230 [ 448.429627][T11679] file_write_and_wait_range+0xfd/0x160 [ 448.435179][T11679] ext4_sync_file+0x266/0x8c0 [ 448.439849][T11679] vfs_fsync_range+0x82/0x150 [ 448.444528][T11679] ext4_buffered_write_iter+0x222/0x290 [ 448.450119][T11679] ext4_file_write_iter+0xfa/0xd70 [ 448.455217][T11679] do_iter_readv_writev+0x487/0x5b0 [ 448.461215][T11679] do_iter_write+0x13b/0x3c0 [ 448.465805][T11679] vfs_iter_write+0x5c/0x80 [ 448.470325][T11679] iter_file_splice_write+0x536/0x850 [ 448.475695][T11679] direct_splice_actor+0xa0/0xc0 [ 448.480627][T11679] splice_direct_to_actor+0x22b/0x540 [ 448.485993][T11679] do_splice_direct+0x161/0x1e0 [ 448.490937][T11679] do_sendfile+0x384/0x7f0 [ 448.495363][T11679] __x64_sys_sendfile64+0x12a/0x140 [ 448.500607][T11679] do_syscall_64+0xcc/0x3a0 [ 448.505110][T11679] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 448.511006][T11679] [ 448.513331][T11679] read to 0xffff88812513bb30 of 4 bytes by task 11679 on cpu 0: [ 448.520949][T11679] ext4_mark_iloc_dirty+0xa32/0x1580 [ 448.526227][T11679] ext4_mark_inode_dirty+0xe9/0x420 [ 448.531421][T11679] ext4_dirty_inode+0xb1/0xe0 [ 448.536092][T11679] __mark_inode_dirty+0x5d4/0x940 [ 448.541101][T11679] generic_write_end+0x1b7/0x1f0 [ 448.546029][T11679] ext4_da_write_end+0x158/0x620 [ 448.551072][T11679] generic_perform_write+0x1d3/0x320 [ 448.556392][T11679] ext4_buffered_write_iter+0x143/0x290 [ 448.561929][T11679] ext4_file_write_iter+0xfa/0xd70 [ 448.567041][T11679] do_iter_readv_writev+0x487/0x5b0 [ 448.572257][T11679] do_iter_write+0x13b/0x3c0 [ 448.576863][T11679] vfs_iter_write+0x5c/0x80 [ 448.581347][T11679] iter_file_splice_write+0x536/0x850 [ 448.586706][T11679] direct_splice_actor+0xa0/0xc0 [ 448.591630][T11679] splice_direct_to_actor+0x22b/0x540 [ 448.596986][T11679] do_splice_direct+0x161/0x1e0 [ 448.601883][T11679] do_sendfile+0x384/0x7f0 [ 448.606286][T11679] __x64_sys_sendfile64+0x12a/0x140 [ 448.611495][T11679] do_syscall_64+0xcc/0x3a0 [ 448.616089][T11679] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 448.621957][T11679] [ 448.624269][T11679] Reported by Kernel Concurrency Sanitizer on: [ 448.630518][T11679] CPU: 0 PID: 11679 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 448.639216][T11679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.649262][T11679] ================================================================== [ 448.657308][T11679] Kernel panic - not syncing: panic_on_warn set ... [ 448.663907][T11679] CPU: 0 PID: 11679 Comm: syz-executor.2 Not tainted 5.6.0-rc1-syzkaller #0 [ 448.672670][T11679] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 448.682714][T11679] Call Trace: [ 448.686006][T11679] dump_stack+0x11d/0x181 [ 448.690370][T11679] panic+0x210/0x640 [ 448.694261][T11679] ? vprintk_func+0x8d/0x140 [ 448.699006][T11679] kcsan_report.cold+0xc/0x1a [ 448.703726][T11679] kcsan_setup_watchpoint+0x3a3/0x3e0 [ 448.709140][T11679] __tsan_read4+0xc6/0x100 [ 448.713676][T11679] ext4_mark_iloc_dirty+0xa32/0x1580 [ 448.718968][T11679] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 448.725460][T11679] ext4_mark_inode_dirty+0xe9/0x420 [ 448.730740][T11679] ? __rcu_read_unlock+0x77/0x3a0 [ 448.735755][T11679] ? ext4_dirty_inode+0x86/0xe0 [ 448.740715][T11679] ext4_dirty_inode+0xb1/0xe0 [ 448.745382][T11679] ? ext4_setattr+0x1270/0x1270 [ 448.750230][T11679] __mark_inode_dirty+0x5d4/0x940 [ 448.755248][T11679] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 448.761158][T11679] generic_write_end+0x1b7/0x1f0 [ 448.766100][T11679] ext4_da_write_end+0x158/0x620 [ 448.771460][T11679] ? ext4_write_end+0x800/0x800 [ 448.776316][T11679] generic_perform_write+0x1d3/0x320 [ 448.781604][T11679] ext4_buffered_write_iter+0x143/0x290 [ 448.787328][T11679] ext4_file_write_iter+0xfa/0xd70 [ 448.792658][T11679] ? common_file_perm+0x1d5/0x490 [ 448.797676][T11679] do_iter_readv_writev+0x487/0x5b0 [ 448.802996][T11679] do_iter_write+0x13b/0x3c0 [ 448.807581][T11679] ? __sanitizer_cov_trace_switch+0x49/0x80 [ 448.814451][T11679] vfs_iter_write+0x5c/0x80 [ 448.818946][T11679] iter_file_splice_write+0x536/0x850 [ 448.824329][T11679] ? page_cache_pipe_buf_release+0x100/0x100 [ 448.830640][T11679] direct_splice_actor+0xa0/0xc0 [ 448.835571][T11679] splice_direct_to_actor+0x22b/0x540 [ 448.840981][T11679] ? generic_pipe_buf_nosteal+0x20/0x20 [ 448.846574][T11679] do_splice_direct+0x161/0x1e0 [ 448.851422][T11679] do_sendfile+0x384/0x7f0 [ 448.855846][T11679] __x64_sys_sendfile64+0x12a/0x140 [ 448.861225][T11679] do_syscall_64+0xcc/0x3a0 [ 448.865773][T11679] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 448.871659][T11679] RIP: 0033:0x45c449 [ 448.875576][T11679] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 448.895289][T11679] RSP: 002b:00007ff5bd8f4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 448.904978][T11679] RAX: ffffffffffffffda RBX: 00007ff5bd8f56d4 RCX: 000000000045c449 [ 448.913069][T11679] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000005 [ 448.921156][T11679] RBP: 000000000076bf20 R08: 0000000000000000 R09: 0000000000000000 [ 448.929173][T11679] R10: 00008400fffffffb R11: 0000000000000246 R12: 00000000ffffffff [ 448.937132][T11679] R13: 00000000000008d0 R14: 00000000004cb335 R15: 000000000076bf2c [ 448.947099][T11679] Kernel Offset: disabled [ 448.951426][T11679] Rebooting in 86400 seconds..