bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 465.562786] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 465.612299] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:12 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:12 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 465.803909] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 465.825232] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:12 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:12 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 466.014451] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:12 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 466.078590] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:12 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:12 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:12 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x80000fffffffc, 0x0) [ 466.258769] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 466.260382] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:12 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, 0x0, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:12 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 466.434736] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 466.465671] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, 0x0, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:13 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 466.652138] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:13 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 466.739300] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, 0x0, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 466.908987] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 466.924166] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x0, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:13 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:13 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x0, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:13 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x80000fffffffc, 0x0) [ 467.124761] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 467.144774] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x0, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:13 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 467.328040] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 467.371863] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:13 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x0, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:14 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x0, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 467.562957] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 467.564190] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:14 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x0, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x0, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 467.762980] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:14 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x0, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 467.821655] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x0, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 467.968380] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:14 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:14 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x80000fffffffc, 0x0) [ 468.016357] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:14 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x0, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x0, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 468.192937] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 468.241017] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:14 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x0, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:14 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x0, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 468.369919] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:15 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x0, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 468.460223] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x0, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 468.570278] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 468.629170] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:15 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x0, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x0, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 468.797175] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:15 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x0, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 468.856305] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:15 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:15 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x80000fffffffc, 0x0) [ 469.000488] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:15 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x0, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 469.101029] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 469.198111] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:15 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x0, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 469.332454] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:15 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 469.413303] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:16 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x0, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 469.542714] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 469.586804] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:16 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0x0, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:16 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x0, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:16 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 469.767367] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 469.769229] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:16 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0x0, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:16 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:16 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x0, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 469.984208] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 470.015361] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:16 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0x0, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:16 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x0, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 470.211725] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 470.238274] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:16 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:16 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x0, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 470.423706] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 470.437270] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:17 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x0, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:17 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 470.626494] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 470.649162] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:17 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:17 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 470.858757] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 470.877244] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:17 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, 0x0, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 471.070880] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 471.113390] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, 0x0, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:17 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:17 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:17 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 471.286285] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 471.318865] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:17 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, 0x0}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:18 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, 0x0, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 471.442859] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 471.445310] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:18 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:18 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:18 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x0, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 471.624530] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 471.639261] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:18 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, 0x0}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:18 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 471.818805] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 471.839103] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 471.947089] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 471.959529] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:18 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x0, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:18 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:18 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, 0x0}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 472.164800] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 472.224428] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:18 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0x0, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 472.315408] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 472.321992] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:18 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:19 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x0, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000fffffffc, 0x0) 14:50:19 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x0, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 472.592784] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000fffffffc, 0x0) [ 472.634638] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 472.668272] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 472.758006] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x80000fffffffc, 0x0) 14:50:19 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0x0, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:19 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x0, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0x0, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 473.010615] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 473.039431] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 473.095560] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 473.198792] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:19 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:19 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:19 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(0xffffffffffffffff, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:19 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x0, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:19 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0x0, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:19 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:20 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 473.483204] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 473.499848] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 473.517046] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:20 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:20 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x0, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:20 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, 0x0, 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:20 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 473.702901] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:20 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x0, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, 0x0, 0x0, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:20 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:20 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:20 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840), 0x0, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 473.905845] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 473.926101] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 473.964500] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:20 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:20 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x0, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 474.093326] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840), 0x0, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:20 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, 0x0, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:20 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:20 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x0, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840), 0x0, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:20 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:20 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 474.322462] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:20 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{0x0}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 474.374302] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:21 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 474.472443] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:21 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x0, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{0x0}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:21 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, 0x0, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:21 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:21 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x0, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:21 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x0, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{0x0}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:21 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 474.720471] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 474.744263] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:21 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x0, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 474.875268] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:21 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:21 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, 0x0, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:21 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x0, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:21 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:21 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x0, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 475.070414] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:21 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:21 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x0, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 475.216583] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0", 0xc4}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 475.257272] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 475.260426] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:21 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:21 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x0, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:21 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0", 0xc4}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:22 executing program 1: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x80000fffffffc, 0x0) 14:50:22 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 475.467999] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:22 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x0, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0", 0xc4}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:22 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x0, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:22 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 475.623865] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x126}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:22 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:22 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x126}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:22 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x0, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 475.813569] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:22 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 475.976714] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:22 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x0, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:22 executing program 3: socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r1, 0x0, r2, 0x0, 0x80000fffffffc, 0x0) 14:50:22 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x126}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:22 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:22 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:22 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x0, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:23 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x157}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:23 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 476.507338] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 476.540506] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:23 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:23 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x157}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 476.600101] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:23 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x0, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 476.804666] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 476.846562] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:23 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445", 0x157}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:23 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0x0, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:23 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:23 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:23 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:23 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, 0x0, 0x0) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:23 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x170}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 477.409758] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 477.412464] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 477.425787] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 477.435260] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:24 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0x0, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x170}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:24 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:24 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:24 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:24 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:24 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x170}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:24 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 477.716496] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 477.730528] overlayfs: failed to resolve './file1': -2 14:50:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x17c}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:24 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0x0, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:24 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000fffffffc, 0x0) 14:50:24 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 477.862397] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 477.894649] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:24 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000fffffffc, 0x0) 14:50:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x17c}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:24 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:24 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 478.050103] overlayfs: failed to resolve './file1': -2 [ 478.084518] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:24 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r0, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x80000fffffffc, 0x0) 14:50:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff", 0x17c}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:24 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(0x0, 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:24 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000fffffffc, 0x0) 14:50:24 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x182}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 478.290395] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 478.302915] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:24 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000fffffffc, 0x0) [ 478.371878] overlayfs: failed to resolve './file1': -2 14:50:24 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x182}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:25 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, 0x0, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x182}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 478.473932] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:25 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x80000fffffffc, 0x0) 14:50:25 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:25 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:25 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:25 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 14:50:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x185}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:25 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) [ 478.700196] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 478.730039] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x185}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 478.789465] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:25 executing program 0: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x0, 0x0) 14:50:25 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:25 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, 0x0, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x185}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:25 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x0, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:25 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x0, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:25 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x187}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:25 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 479.121310] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 479.166636] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 479.174952] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0x187}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 479.212701] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034", 0x187}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:25 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x0, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:25 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, 0x0, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:25 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x0, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:25 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:26 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x0, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:26 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 479.523855] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 479.665307] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 479.690478] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:26 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x0, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 479.828066] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:26 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:26 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x0, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 479.943803] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:26 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x0, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:26 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x0, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:26 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:26 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x0, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 480.139834] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:26 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, 0x0, &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:26 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, 0x0, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 480.472065] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 480.487236] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 480.497003] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 480.524352] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:27 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x0, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:27 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:27 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, 0x0, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x0, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:27 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x0, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:27 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x0, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 480.805684] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 480.912972] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:27 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:27 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x0, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 480.958871] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 480.998756] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:27 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x0, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:27 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, 0x0, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, 0x0, 0x0) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:27 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x0, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 481.206536] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:27 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:27 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 481.316882] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 481.350467] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:27 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x0, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 481.433197] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:28 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0), 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:28 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x0, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 481.658008] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:28 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 481.736290] overlayfs: missing 'lowerdir' [ 481.736514] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:28 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 481.889096] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:28 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 481.960474] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:28 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x0, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 482.106883] overlayfs: missing 'lowerdir' [ 482.116323] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:28 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:28 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:28 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 482.289121] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:28 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:28 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 482.330870] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 482.393519] overlayfs: missing 'lowerdir' [ 482.412733] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:29 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x0, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:29 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:29 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(0x0, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:29 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 482.621200] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 482.666675] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 482.703638] overlayfs: failed to resolve 'file': -2 14:50:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:29 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x0, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 482.775215] overlayfs: missing 'lowerdir' 14:50:29 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 482.855648] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:29 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:29 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:29 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 483.037810] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 483.079823] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 483.146747] overlayfs: missing 'lowerdir' 14:50:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:29 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 483.245124] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 483.304211] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:29 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[]) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:29 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:29 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x0, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:30 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:30 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(0xffffffffffffffff, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 483.475747] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 483.537229] overlayfs: missing 'lowerdir' 14:50:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 483.610292] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:30 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x0, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:30 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 483.712989] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 483.719247] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:30 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x0, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:30 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 483.910286] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:30 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, 0x0, 0x0) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 483.957918] overlayfs: missing 'lowerdir' 14:50:30 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 484.033013] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:30 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 484.135386] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 484.170681] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:30 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 484.275589] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:30 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) [ 484.340267] overlayfs: missing 'lowerdir' 14:50:30 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:30 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x0, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 484.388939] overlayfs: unrecognized mount option "lowerdir" or missing value 14:50:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000fffffffc, 0x0) 14:50:31 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:31 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 484.525657] overlayfs: unrecognized mount option "lowerdir" or missing value [ 484.563837] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000fffffffc, 0x0) [ 484.665299] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x80000fffffffc, 0x0) 14:50:31 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x0, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:31 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 484.816169] overlayfs: missing 'lowerdir' 14:50:31 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x0, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x80000fffffffc, 0x0) 14:50:31 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:31 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=.']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x80000fffffffc, 0x0) [ 484.985851] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 485.042300] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x80000fffffffc, 0x0) [ 485.119557] overlayfs: missing 'lowerdir' [ 485.138131] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:31 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x0, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 485.215702] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:31 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=.']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:31 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:31 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x0, 0x0) [ 485.392208] overlayfs: missing 'lowerdir' 14:50:31 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:32 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x0, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x0, 0x0) [ 485.485155] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 485.489716] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:32 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=.']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:32 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x0, 0x0) [ 485.653699] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:32 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:32 executing program 0: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x0, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 485.710602] overlayfs: missing 'lowerdir' [ 485.754626] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:32 executing program 5 (fault-call:11 fault-nth:0): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r2, 0x0, r3, 0x0, 0x80000fffffffc, 0x0) 14:50:32 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x0, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:32 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lower']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 485.939021] FAULT_INJECTION: forcing a failure. [ 485.939021] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 485.943667] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 485.955122] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 485.997050] CPU: 1 PID: 25434 Comm: syz-executor.5 Not tainted 4.14.217-syzkaller #0 [ 486.005263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.014628] Call Trace: [ 486.017228] dump_stack+0x1b2/0x281 [ 486.020908] should_fail.cold+0x10a/0x149 [ 486.025333] __alloc_pages_nodemask+0x22c/0x2720 [ 486.030111] ? ima_match_policy+0x833/0x10e0 [ 486.034988] ? __lock_acquire+0x5fc/0x3f20 [ 486.039237] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 486.044097] ? __lock_acquire+0x5fc/0x3f20 [ 486.048460] ? trace_hardirqs_on+0x10/0x10 [ 486.052712] ? __lock_acquire+0x5fc/0x3f20 [ 486.056964] alloc_pages_current+0x155/0x260 [ 486.061397] skb_page_frag_refill+0x1bf/0x490 [ 486.065932] sk_page_frag_refill+0x4a/0x1b0 [ 486.070265] alloc_sg+0x13e/0x730 [ 486.073830] tls_sw_sendpage+0x424/0xb50 [ 486.077909] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 486.082065] inet_sendpage+0x155/0x590 [ 486.085963] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 486.090121] ? inet_getname+0x3a0/0x3a0 [ 486.094102] sock_sendpage+0xdf/0x140 [ 486.097912] pipe_to_sendpage+0x226/0x2d0 [ 486.102087] ? sockfs_setattr+0x140/0x140 [ 486.106352] ? direct_splice_actor+0x160/0x160 [ 486.110948] __splice_from_pipe+0x326/0x7a0 [ 486.114636] overlayfs: unrecognized mount option "lower" or missing value [ 486.115279] ? direct_splice_actor+0x160/0x160 [ 486.115295] generic_splice_sendpage+0xc1/0x110 [ 486.131476] ? vmsplice_to_user+0x1b0/0x1b0 [ 486.135820] ? rw_verify_area+0xe1/0x2a0 [ 486.139927] ? vmsplice_to_user+0x1b0/0x1b0 [ 486.144525] SyS_splice+0xd59/0x1380 [ 486.148255] ? SyS_write+0x14d/0x210 [ 486.151981] ? compat_SyS_vmsplice+0x150/0x150 [ 486.156573] ? SyS_clock_settime+0x1a0/0x1a0 [ 486.161002] ? do_syscall_64+0x4c/0x640 [ 486.165014] ? compat_SyS_vmsplice+0x150/0x150 [ 486.169789] do_syscall_64+0x1d5/0x640 [ 486.178151] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 486.183355] RIP: 0033:0x45e219 [ 486.186556] RSP: 002b:00007f0825106c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 14:50:32 executing program 3: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x0, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:32 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 486.194421] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e219 [ 486.202220] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000005 [ 486.209496] RBP: 00007f0825106ca0 R08: 00080000fffffffc R09: 0000000000000000 [ 486.216768] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 486.224061] R13: 00007ffed82d6cbf R14: 00007f08251079c0 R15: 000000000119bf8c 14:50:32 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lower']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 486.253675] overlayfs: fs on './file0' does not support file handles, falling back to index=off. 14:50:32 executing program 0 (fault-call:12 fault-nth:0): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 486.430261] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 486.460311] overlayfs: unrecognized mount option "lower" or missing value 14:50:33 executing program 1 (fault-call:9 fault-nth:0): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)='0', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x5af1) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 486.476698] FAULT_INJECTION: forcing a failure. [ 486.476698] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 486.480093] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 486.553643] CPU: 1 PID: 25470 Comm: syz-executor.0 Not tainted 4.14.217-syzkaller #0 [ 486.561590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 486.570954] Call Trace: [ 486.573554] dump_stack+0x1b2/0x281 [ 486.577215] should_fail.cold+0x10a/0x149 [ 486.581382] __alloc_pages_nodemask+0x22c/0x2720 [ 486.586163] ? ima_match_policy+0x833/0x10e0 [ 486.590598] ? __lock_acquire+0x5fc/0x3f20 [ 486.594947] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 486.599810] ? __lock_acquire+0x5fc/0x3f20 [ 486.604194] ? trace_hardirqs_on+0x10/0x10 [ 486.608444] ? __lock_acquire+0x5fc/0x3f20 [ 486.612693] alloc_pages_current+0x155/0x260 [ 486.617113] skb_page_frag_refill+0x1bf/0x490 [ 486.621621] sk_page_frag_refill+0x4a/0x1b0 [ 486.625950] alloc_sg+0x13e/0x730 [ 486.629431] tls_sw_sendpage+0x424/0xb50 [ 486.633508] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 486.637667] inet_sendpage+0x155/0x590 [ 486.641568] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 486.647198] ? inet_getname+0x3a0/0x3a0 [ 486.651180] sock_sendpage+0xdf/0x140 [ 486.655012] pipe_to_sendpage+0x226/0x2d0 [ 486.659165] ? sockfs_setattr+0x140/0x140 [ 486.663321] ? direct_splice_actor+0x160/0x160 [ 486.667912] __splice_from_pipe+0x326/0x7a0 [ 486.672243] ? direct_splice_actor+0x160/0x160 [ 486.676834] generic_splice_sendpage+0xc1/0x110 [ 486.681537] ? vmsplice_to_user+0x1b0/0x1b0 [ 486.686424] ? rw_verify_area+0xe1/0x2a0 [ 486.690497] ? vmsplice_to_user+0x1b0/0x1b0 [ 486.694838] SyS_splice+0xd59/0x1380 [ 486.699128] ? SyS_write+0x14d/0x210 [ 486.702860] ? compat_SyS_vmsplice+0x150/0x150 [ 486.707630] ? SyS_clock_settime+0x1a0/0x1a0 [ 486.712083] ? do_syscall_64+0x4c/0x640 [ 486.716155] ? compat_SyS_vmsplice+0x150/0x150 [ 486.720855] do_syscall_64+0x1d5/0x640 [ 486.724776] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 486.730075] RIP: 0033:0x45e219 [ 486.733360] RSP: 002b:00007fa193102c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 486.741071] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e219 14:50:33 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)='0', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x5af1) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000140)={0x1, 0x38475373, 0xd04}) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 486.748352] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 486.755628] RBP: 00007fa193102ca0 R08: 00080000fffffffc R09: 0000000000000000 [ 486.762911] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 486.771131] R13: 00007fff6ffad10f R14: 00007fa1931039c0 R15: 000000000119bf8c 14:50:33 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:33 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) r2 = socket$bt_cmtp(0x1f, 0x3, 0x5) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r2, 0x8010671f, &(0x7f0000000140)={&(0x7f0000000080)=""/38, 0x26}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r4) r5 = openat$incfs(r1, &(0x7f0000000180)='.log\x00', 0x1, 0x2a) ioctl$SNDCTL_DSP_GETOSPACE(r5, 0x8010500c, &(0x7f00000001c0)) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r3, 0x0, r4, 0x0, 0x80000fffffffc, 0x0) 14:50:33 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lower']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:33 executing program 0 (fault-call:12 fault-nth:1): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:33 executing program 3 (fault-call:9 fault-nth:0): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)='0', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x5af1) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:33 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)='0', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BTRFS_IOC_ADD_DEV(r4, 0x5000940a, &(0x7f0000000880)={{r0}, "1404da63caf7d6c64c977da8b9b976f3f846e0a51ff9326aeecf7e9aeed0eedb1db9b4de60ee1ac937aeb07f1181b58f56d4d94155028bf326b62e39f3991d39151c3ce82333f90e0209f45d8444a25e474e052009d1d3d55542d9598229234141f5278c6de0d009290a93196b7e6e11bac48f5c5ef5db19951be695510316c70394b9d5815aa5e15ebeb3fe289fb138c2adc17bd5368cfa826ac1ec8a8a8dc667fa15f523dba61a7d76b79ecc51a727a3e3a9e1e0932117c737348f69fbb08cb7bdf13beb9fdbee8afaca33c9929f795e2caa6a6cfab15fbc73afb9f208752aa89185ddba3f54123c6f0f85b4e5cf55a8e2f5caba1d642ed91a2f76cc02641ab0a96cfa6364a2474aeb8196b93b97b9b67e012efd01f180c85bce15da60dc6b50207486a15091f67d9a7343c9a424342a7d18529107efbc68ff1c7daac154992a3bc73f97bf90af26e3f9519717b2be461251a09aee9008f402f310834f3d917c662b662b32afb3495647f1ecf15ee671e128d5fb5382938e5b437e176a0e21e873d642f79fb66d60a77b07f824af110115bb9b44e453bbedc2d79cd1c95dce21f81cc55ca9e988c28d94c25b396801898ddddf47ef8d4c03fbb8c0e88e3d60a2ab63e200f8f4bbf1c9d0c51023d3bd1e3c35ad53efb787878b1c9d812e010f984f81d9ca7d3629279e9828f5bd2f1faa67205812ba96119cd6f0157f3c9ea1a5aa6232aac334b5c496ab4474be8f5684f46b324b091343c1d4ada688d3a1881f437fcbdf1b0a2b68b1410a5e11dfb9f048b2f465ac89a49866df48a6892dd8337d3203eabca816c8735b877e49242155e1ab58ca8eccfcb1d454acf8cc58c7c321761c9871b5dca071aaacc9fa4235d75d0c4a605e9d9d82c7f036c2dbcc7ca025c088c4161db9423eda5400ccfa64f5c1b42c458393dc248fe16ea1165dc52d3dfddfcf3ef255c4e1205be17428a51c26182596307f3fcb9be617eb7f7aaaf7b1194bbf17f8b6569615243e569ff7243107c1d8dc128ad7d75f21c826ebd752d812b707f9d116463b89443c3367c4bd59cb56105678b994e98a23b28384961abf5d4433b8d513875475bc67276441854e8b43c6ccdbfcedf9261440244a4614753057d227f89e3d8b087739284c00b4caadecc5917ac79e176a3412d43c884a75266d34b9bec613a8ec932d76dfd6bb2948ec204feb8230f8ea2789e264d4cbc2dc0ebc6cd616e7326a0ee78f860f46c450731d8af17e376e87850da66593564ce3ad9bf1551a38f60bb9dae610f6fab878518fb3d286b95ebc84155566249fbd014cebd532bac01de0788654d5a3d87ede98cd5f46e758b7f2a3ab1e06a40c478c445745e4c895128dd2084a65ec8c1f87159f42ab871199142d8f4d78886afb73ff618e4a723252df58457837eced0d73569b5bb4bed91dd75b0e9a0288bcd91e2800fadf3a4629abe65c1b840d24f89ea433c105d80f40155d4ba48706ede8318c3cbb88ccc5bdbe363714e26983492383478aaf7f29592889a63b38e55035a4786afcbba165364060f241f4e7ef6bcd3927caca5b9d04bd6bd0cc1884801e5cf2b05504b018db3c5ee51938e8c936f42818d0af97eb95d9f3e18917a652c590308e28b5592f7978e596ed6055dc084148592596ed81183eb14308bf44732cbb620e38c99bf914e63ace3977bb064b16cbdab7d1e48f15cad945df1c99c54e9a7709833ce7590364bb9dee54de011892eca2f4e3669086494faed4c605114ca84b2cbcfbedc6eced14f989b26e4a1f27b882f56b6e0113c0816ea33e642aeaec43948eb179a0f979b8d036401eafd5ffb5588039aad62c409666d6c57cbf3e435ebc2c775b6f256453b4eb9bac38f4aa0a684e465fa424df875d23eb344195002b7c18a0f5bab39e65bd0dfff53f1c8cb5cfe2b54f8af05af2e376d80ea64db001f1fdde52b012c12493350d9dd20c6122bf8c51f1a93ef07d8330604c5ef98ec74f106eed23f30d131b2e8acb7000b255c109ef53719aae8bbad375abcb0375760218ecaa956dab6c2722df7a6dbb19dcb1f9bbfa93e43c701c320e427de359d238b0ceb916f923b268cbef625e15c2b801fa027455e18872620382aa2ae5c62edef80f1b5d9b3f2336becac0be899e38fffe42b54c8271036a5fae522b4b6b138db4af2c8be28c47d5444616e30882baa2db760931929d25d7d6db4c663c1957fb3c48cfbd63ff49e0ccc3529c4653e2a067b389f48352f4a12c7406a8abf30b99b2c178b1837c2500940fd841b5ec9c8631d77913920eacffbf96bccf5e448cafaf1cfb7836d7b60e6884fd0645f1e3c2f6d6ee93c56f0cc91b3cfa8604989ede475817af677528916599e496817dd551ff9098474b7db34e5313db0115791c517cab558ab2faa1cdaeba6516993c9d40cd7389ae53d97c383fa65f98c9aeca32b6a9d3d6d042228a551ad879720b72a2e847b94ff0ec053c80714228ee4651e0b65431eecec71f5fc2585eb36c2e1f5375e590339c4d832cf5023eed79ecac71c9993cc932bc3f3de11bb59d411745cb5f983f4156bbd127f2de0c647e7f8c3ddfc2cf0c964d3b132bb4dc65f929bc4cdea3d95506b2ad1da7d2d49e4591809f9c557a75e2984c7d539abe26d06476000420c28c7204ebc83ef93ac32df8812a37aa77738c4adfe33fde4592ce139d0de95af228b9cc3d8dd4e5433b49a4ae103a524513f81824f865c774ef300e00ed24a6fc3b8eefd24b7d9ada7a97acfaeef2f44b4be5b13ac04e4953f78dca48fe07cc3546e4a4de17a6bc61b2c69a2e9a1f1f239b6f786cb146dd796cfaec6e5683a85312c74dc652eba278d1073a5b8211d56aac5d030833c64be242da44075ad009c6cc9c5981f3d56d246128e230383f1f7bfedf0974a50b7070fa07569ea62cc32d2006a3d9724c239998f7144ff69919af386508239d16543c22273681863f5318b19508b03e95d6dfc12b2708b45bfa0174952ae96ce868905e3c7d907ee152a1fce6e602ac2ca5c60a91e3f22ab031aca418b9da300f54dd4246e79b5ca041dc0911b222b6be8c4482ac250fda55b818562702ad09502681898f2c4516c4c347c966ecba506d6c6f1fe33ca8b2ae9d5880b8b3ef665b56db906633322bc56c08dd5a92b0f9570b18b13b1a7af81b02456b1d9bb3469ba3c3a7a4aa5d25710db3e90b7c4187ee40637e0499cbb6af9a58bb87efde2ceccf38f94fdd8c5a12aa1cb62910525c47a14df7bbf6958405259478c63d2730ad3a84bd9dc623fdabc8cdcfd75c41b44c6a083aa9d1885550ff9afd63282d2e8c249d0ca469b7373d5269a0256a44a30f587c2a68781737db7141e678b5677297f4894bef4b7a7d9aec2d9ec11856de6f27550a4be9ee5a181d1bd4b92523e3c8e1430821d7ae51c3ef73025feae1cc0e1bb95bc2d2257a1f704e72574dc54d6b9bf13eab6872ee7e2f0e1e09d52054dc25c4c61b0fcbe26b3e392961b36a0deb2b924084593dacd37129ca84a47c2d6095190989e75d6ad63ce095283a75efd79c9de7c4d92763520d2afe385b28872bdfde0d4c53bb9877b621ab022f75a74f6230948d0586ef5cacd6e6aa593b5bc6c649cfa649cb7e4f5ef5016763d1a0a59a98dac204f49c513b6b781da555cdec0fed4b58cb61421dcf643d47440e8792c6d6032618280cfda311614a297b18d005f6a546ffebc80ca8ffc6a32e9e0aeff19b566e70d2e741a13dde40f9a83ddfbc55b22e2083ba9c15ea0da736be614edf225d60e98f1b1e453e227792987007617a3a1d71cd486b7328d80a8388f7204b3ee092445965ce3821e37a078c5a244a5d1d65b31dcde880a3a349f24108bc6c840144ac8ead340d3b1f0f645f96b3b23623237684eede7f1642845fd58b813dd860f12444feabb246f1474af0347b1c1f490dd4b47d1c6a635100e66579aead686e3991697f5cbe7f8897bc80e213bf8214d035b8358db42c8f9a99c096b1a157b002d87590eb573b5094185d28abbe4bd4f53cfc0f9f96a78913d0ecf170b0b691f5b6f1d250d0b970ba89ccfcc8f544db9cf1ced7a7565e9850295567e809ff4582d25afe72295f28d7f68ae6ac3ce9564d04f4d80dd51a041c672956776379f379511d2f8369e5c269e8eb0acc5719cb2fe93ee01ab842a14aa5c12494a46d1ea4d4a80b9bd4134e434f2797509d75a658a97b35d70f1e9999e27a234eae964d69e030b7ba161e65bba0d0b1301276cfeb3306a6ca50e1f44533482778f7ba58fad2c847dd5182762d652be3a73b999b33179f646ef9259d3e0c985bd06d5acab27fc232ac2a896c26203a419e7374847d0573d4be95e8e13b01ca6c0ea5ff066d0ee28ba6b77fb13317c7202ccbabe09760434ccdcbec638a0a0834c548a610ae1ca04e1dca94dfe43c5818d04fbd02e4b14f6889717cbb9f2f301b5ef98ad2e023e12b837d3d09f28c841b2e32d8a58f4e51a95d682ac78ca8962f814517ab5a42a14513784e37a97134166564aed2bfda933bffe7a72c0677707dd1a35a40e457f53c832c198dcac6bd922a8a4ab41d909db5b39a9bb77ce2591789ebf4e4162b91bdd715ee5f93421f59e0a461c46ded9acdcda423c59c79021f905270d7b87a4e24ec08725986dda35089f232d7c9c81a33bb062a8cf9b65d4c2ee51b2bdf8d7d6d9c90dd9fa5ca67bca52d8bc07ecf4daab350ced25e6829f7ad2274b8300cb2a8e2f9b4f8459a987d1e45c8237cf2fcc00bbcf9031008a2495e042c9c05dc5eeeff14bd33ae7b3e8451e492b3e4629abdb8811c94c54ab506c539bdf7944e31ab2708fa1377201243dbe10d5b0798586fdfaf0dd7a3b22236bd85e2db7e04df3c0198b9bfdfe9d142eecc1a0ce8565241dcba0262089663a5c71cf6a488b0ade30cb85761b6d3733973167ff732b22f9d92e2c56ab6202da69b2ad0cc86788e10de13c372ad07c80654734241e90b039e93f1190ac6bd9897bd5997da158b1d1e37b3678dae8784ce76aa1e9fc1f75b68dc2faabdfe480238f5f611d6ac71d3b508ce556edb214daee9a48c74d45bc2547dbb2a76821feeb66b3c7af5a0ae8707c0d1b689732f19590a24f15feb36b37df8c3edfa2b8ec21075d99dc3f5443ada118d3227693bec4a84f79f5fb3a440cde824b1fc4046d60ef1abae4433a69546e842ed43b5008b547939bd3bfd0722ef400fea3515418c20e9dbe77a69e924ff265f6140ef6ad34e0168667a3cc150ac07edfc44c9e71e968b94ddc82989a56f0b709ae69e60ae34f5841edb55d71936558873f791e7eed232fde85f1a14ddb31acfecb7f63a3b5cd874d05f1bd721ec7809da4f1b4336494b6b1f9d838b511716e128c37cfbd4fefb6c2c57b5a9c61d05dee06d041f045672d1eb02f7b733df95f6bc7483bcdb2cc23fab2f6649278750a485d2503538d79add89a2a065189a696b1abdb9a279cf5acc00e7e23b7b55ace4965203754eaaac7afcaada395b9f866a1d74d7cfde4b03a7b1668c0f78f5e03c1a2cddc6871b30a0227fed3012dd5dc5c457c6a7037c3b7d6b2c1480514897b6154cabdff83976eef2ee48afb004e9f5072fd0adbfaa65b2fe646d65a92fbb2062714991b331532d046b569bb04fc0c421aabf086b6f7a1d47c22bc4475ef028055f305466746db37cb2298783403e509beb17a32bcab33f58eff87283bd6327a78f6a1971f8e2bb504e63fa14228432c8b939ec862516657807f4d5cd2dd118443159dfa19b1af211b507628dd2d55d3f"}) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x5af1) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='mountinfo\x00') utimensat(r5, 0x0, &(0x7f00000001c0)={{0x0, 0x3fffffff}}, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "000100", "c690a19c0e729877"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 486.927772] FAULT_INJECTION: forcing a failure. [ 486.927772] name failslab, interval 1, probability 0, space 0, times 0 [ 486.959730] FAULT_INJECTION: forcing a failure. [ 486.959730] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 486.980694] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 487.005852] CPU: 1 PID: 25503 Comm: syz-executor.0 Not tainted 4.14.217-syzkaller #0 [ 487.014218] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.023580] Call Trace: [ 487.026185] dump_stack+0x1b2/0x281 [ 487.030346] should_fail.cold+0x10a/0x149 [ 487.034530] should_failslab+0xd6/0x130 [ 487.038515] __kmalloc+0x2c1/0x400 [ 487.042069] ? tls_push_record+0xfa/0x1270 [ 487.046314] tls_push_record+0xfa/0x1270 [ 487.050396] tls_sw_sendpage+0x760/0xb50 [ 487.054471] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 487.058648] inet_sendpage+0x155/0x590 [ 487.062551] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 487.066709] ? inet_getname+0x3a0/0x3a0 [ 487.070708] sock_sendpage+0xdf/0x140 [ 487.074515] pipe_to_sendpage+0x226/0x2d0 [ 487.078668] ? sockfs_setattr+0x140/0x140 [ 487.082819] ? direct_splice_actor+0x160/0x160 [ 487.087412] __splice_from_pipe+0x326/0x7a0 [ 487.092295] ? direct_splice_actor+0x160/0x160 [ 487.096925] generic_splice_sendpage+0xc1/0x110 [ 487.101612] ? vmsplice_to_user+0x1b0/0x1b0 [ 487.105957] ? rw_verify_area+0xe1/0x2a0 [ 487.110038] ? vmsplice_to_user+0x1b0/0x1b0 [ 487.114373] SyS_splice+0xd59/0x1380 [ 487.118106] ? SyS_write+0x14d/0x210 [ 487.121828] ? compat_SyS_vmsplice+0x150/0x150 [ 487.126435] ? SyS_clock_settime+0x1a0/0x1a0 [ 487.130874] ? do_syscall_64+0x4c/0x640 [ 487.134975] ? compat_SyS_vmsplice+0x150/0x150 [ 487.139568] do_syscall_64+0x1d5/0x640 [ 487.143567] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 487.148852] RIP: 0033:0x45e219 [ 487.152073] RSP: 002b:00007fa193102c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 487.159881] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e219 [ 487.167176] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 487.174670] RBP: 00007fa193102ca0 R08: 00080000fffffffc R09: 0000000000000000 [ 487.176915] overlayfs: unrecognized mount option "lower" or missing value [ 487.181946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 487.181953] R13: 00007fff6ffad10f R14: 00007fa1931039c0 R15: 000000000119bf8c [ 487.214944] CPU: 0 PID: 25507 Comm: syz-executor.3 Not tainted 4.14.217-syzkaller #0 [ 487.223056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.232425] Call Trace: [ 487.235028] dump_stack+0x1b2/0x281 [ 487.238671] should_fail.cold+0x10a/0x149 [ 487.242831] __alloc_pages_nodemask+0x22c/0x2720 [ 487.247629] ? ima_match_policy+0x833/0x10e0 [ 487.252089] ? __lock_acquire+0x5fc/0x3f20 [ 487.256343] ? gfp_pfmemalloc_allowed+0x150/0x150 [ 487.261640] ? __lock_acquire+0x5fc/0x3f20 [ 487.265898] ? trace_hardirqs_on+0x10/0x10 [ 487.270149] ? __lock_acquire+0x5fc/0x3f20 [ 487.277815] alloc_pages_current+0x155/0x260 [ 487.282281] skb_page_frag_refill+0x1bf/0x490 [ 487.286796] sk_page_frag_refill+0x4a/0x1b0 [ 487.291224] alloc_sg+0x13e/0x730 [ 487.294703] tls_sw_sendpage+0x424/0xb50 [ 487.298786] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 487.302956] inet_sendpage+0x155/0x590 [ 487.306935] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 487.311098] ? inet_getname+0x3a0/0x3a0 [ 487.315085] sock_sendpage+0xdf/0x140 [ 487.318901] pipe_to_sendpage+0x226/0x2d0 [ 487.323087] ? sockfs_setattr+0x140/0x140 [ 487.327342] ? direct_splice_actor+0x160/0x160 [ 487.331949] __splice_from_pipe+0x326/0x7a0 [ 487.336321] ? direct_splice_actor+0x160/0x160 [ 487.340919] generic_splice_sendpage+0xc1/0x110 [ 487.345608] ? vmsplice_to_user+0x1b0/0x1b0 [ 487.349948] ? rw_verify_area+0xe1/0x2a0 [ 487.354036] ? vmsplice_to_user+0x1b0/0x1b0 [ 487.356041] FAULT_INJECTION: forcing a failure. [ 487.356041] name failslab, interval 1, probability 0, space 0, times 0 [ 487.358378] SyS_splice+0xd59/0x1380 [ 487.358399] ? SyS_write+0x14d/0x210 [ 487.358410] ? compat_SyS_vmsplice+0x150/0x150 [ 487.358420] ? SyS_clock_settime+0x1a0/0x1a0 [ 487.358430] ? do_syscall_64+0x4c/0x640 [ 487.358448] ? compat_SyS_vmsplice+0x150/0x150 [ 487.394780] do_syscall_64+0x1d5/0x640 [ 487.398680] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 487.403892] RIP: 0033:0x45e219 [ 487.407081] RSP: 002b:00007f9439ae3c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 487.414794] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e219 [ 487.422063] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 14:50:33 executing program 0 (fault-call:12 fault-nth:2): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:33 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)='0', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, 0x0, 0x0, 0x70bd2a, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4001) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0xe0000) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) [ 487.429355] RBP: 00007f9439ae3ca0 R08: 00080000fffffffc R09: 0000000000000000 [ 487.436636] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 487.443911] R13: 00007ffd1156e30f R14: 00007f9439ae49c0 R15: 000000000119bf8c [ 487.451225] CPU: 1 PID: 25527 Comm: syz-executor.0 Not tainted 4.14.217-syzkaller #0 [ 487.459138] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.468492] Call Trace: [ 487.471090] dump_stack+0x1b2/0x281 [ 487.474743] should_fail.cold+0x10a/0x149 [ 487.478904] should_failslab+0xd6/0x130 [ 487.482891] __kmalloc+0x6d/0x400 [ 487.486357] ? gcmaes_encrypt.constprop.0+0x527/0xc00 [ 487.491554] ? __lock_acquire+0x5fc/0x3f20 [ 487.495795] gcmaes_encrypt.constprop.0+0x527/0xc00 [ 487.500819] ? generic_gcmaes_encrypt+0xf4/0x130 [ 487.505578] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 487.510424] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 487.515456] ? __kmalloc+0x3a4/0x400 [ 487.519178] ? tls_push_record+0xfa/0x1270 [ 487.523440] ? cryptd_aead_child+0x9/0x40 [ 487.527598] ? tls_push_record+0x938/0x1270 [ 487.531944] ? tls_sw_sendpage+0x760/0xb50 [ 487.536213] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 487.540405] ? inet_sendpage+0x155/0x590 [ 487.544476] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 487.548671] ? inet_getname+0x3a0/0x3a0 [ 487.552658] ? sock_sendpage+0xdf/0x140 [ 487.556752] ? pipe_to_sendpage+0x226/0x2d0 [ 487.561176] ? sockfs_setattr+0x140/0x140 [ 487.565424] ? direct_splice_actor+0x160/0x160 [ 487.570022] ? __splice_from_pipe+0x326/0x7a0 [ 487.574529] ? direct_splice_actor+0x160/0x160 [ 487.579135] ? generic_splice_sendpage+0xc1/0x110 [ 487.584019] ? vmsplice_to_user+0x1b0/0x1b0 [ 487.588377] ? rw_verify_area+0xe1/0x2a0 [ 487.592445] ? vmsplice_to_user+0x1b0/0x1b0 [ 487.596777] ? SyS_splice+0xd59/0x1380 [ 487.600673] ? SyS_write+0x14d/0x210 [ 487.604396] ? compat_SyS_vmsplice+0x150/0x150 [ 487.608982] ? SyS_clock_settime+0x1a0/0x1a0 [ 487.613399] ? do_syscall_64+0x4c/0x640 [ 487.617377] ? compat_SyS_vmsplice+0x150/0x150 [ 487.621969] ? do_syscall_64+0x1d5/0x640 [ 487.626051] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 14:50:34 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, 0x0, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x0, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x0, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x10001, 0x18c0, 0x4, 0x101, 0x1, 0x6, 0x4, 0x8000, 0xfffffffb, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./file0']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:34 executing program 3 (fault-call:9 fault-nth:1): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)='0', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x5af1) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:34 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 487.701715] FAULT_INJECTION: forcing a failure. [ 487.701715] name failslab, interval 1, probability 0, space 0, times 0 [ 487.753260] CPU: 0 PID: 25536 Comm: syz-executor.3 Not tainted 4.14.217-syzkaller #0 [ 487.761371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 487.770916] Call Trace: [ 487.773532] dump_stack+0x1b2/0x281 [ 487.777201] should_fail.cold+0x10a/0x149 [ 487.781369] should_failslab+0xd6/0x130 [ 487.785364] __kmalloc+0x2c1/0x400 [ 487.788904] ? tls_push_record+0xfa/0x1270 [ 487.794906] tls_push_record+0xfa/0x1270 [ 487.798994] tls_sw_sendpage+0x760/0xb50 [ 487.803076] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 487.807234] inet_sendpage+0x155/0x590 [ 487.811122] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 487.815271] ? inet_getname+0x3a0/0x3a0 [ 487.819243] sock_sendpage+0xdf/0x140 [ 487.823088] pipe_to_sendpage+0x226/0x2d0 [ 487.827236] ? sockfs_setattr+0x140/0x140 [ 487.831390] ? direct_splice_actor+0x160/0x160 [ 487.835979] __splice_from_pipe+0x326/0x7a0 [ 487.840303] ? direct_splice_actor+0x160/0x160 [ 487.845243] generic_splice_sendpage+0xc1/0x110 [ 487.849916] ? vmsplice_to_user+0x1b0/0x1b0 [ 487.854259] ? rw_verify_area+0xe1/0x2a0 [ 487.858336] ? vmsplice_to_user+0x1b0/0x1b0 [ 487.862674] SyS_splice+0xd59/0x1380 [ 487.866500] ? SyS_write+0x14d/0x210 [ 487.870213] ? compat_SyS_vmsplice+0x150/0x150 [ 487.874802] ? SyS_clock_settime+0x1a0/0x1a0 [ 487.879213] ? do_syscall_64+0x4c/0x640 [ 487.883744] ? compat_SyS_vmsplice+0x150/0x150 [ 487.888327] do_syscall_64+0x1d5/0x640 [ 487.892225] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 487.897432] RIP: 0033:0x45e219 [ 487.900612] RSP: 002b:00007f9439ae3c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 487.908339] RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 000000000045e219 [ 487.915790] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 487.923587] RBP: 00007f9439ae3ca0 R08: 00080000fffffffc R09: 0000000000000000 [ 487.930865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 487.939094] R13: 00007ffd1156e30f R14: 00007f9439ae49c0 R15: 000000000119bf8c 14:50:34 executing program 5: socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) vmsplice(0xffffffffffffffff, &(0x7f0000000640)=[{&(0x7f00000003c0)="679faf57af7e636cf60d0a526a94ad0e294c870bdee8ead97c592e532254c7184a7125ef6878eb13c6d1a3f149f47b2763196815486da135294249e3cbc34faabe3613e884166cc06d2a18303a0ff23af6da39ada2a4f76698cc3b524c7774ec1fef46edd1d15ef78369e0f39c798f1d72865c531da45f174b5cf64777f02d6fe653ea7df9713a274d6523018f78e692fbf00cfedee573300ffeecd0e4c05db12da960d3a7bc891c5e90d03cc215e0835cf4bedde178661f39a6b797256b9d301a881627", 0xc4}, {&(0x7f00000004c0)="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", 0xfc}, {&(0x7f00000005c0)="de040406ccde162cff6e9bfe7e36c174d75b406f7acf7c5abaceca8f943a78111bd15df2bcee89784e6ac945df69d4927ffffd7359e1de6f7c413bbc45196a01124ae0ed8d83d9093ecdab0bf00c3c6b32685687dadce4d746aea668598531bd873325dbcc", 0x65}], 0x3, 0x11) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000280)={{{@in=@loopback, @in=@local}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000880)=0xe8) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r5 = dup(r4) pwritev(r5, &(0x7f0000000240)=[{&(0x7f0000000140)="a339e4349209711d2176bedba4a1f6e4d1190ddc0abe4c6f97fca044f3080af2a2978b632dc4b20053104a95914ea67cbd18dc6263b4c33fe003b8c68c67a24584f55d97a018dadf1da6d2b714c53ef54f5b77ba1dab6604acf8b33919a8d4423f8f3b562e6545dfc31e57e27a83f20451f9b63fd9915a39b121c32336425fbd7ddcddbbeeb1287bc26d82caa20695694006b4ac529bbb230c97684633432dec6adfd73bb4f3b7408348a3ae2c2a0a3e84b069509fd5", 0xb6}, {&(0x7f0000000080)="a0916e54cf423f8eb737672487780a85ffd1a575583b70cc51215d7b541e5def8e3bb97be524a2a351401394", 0x2c}], 0x2, 0x6, 0x7fffffff) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0xfffffcac) setsockopt$inet6_tcp_TCP_ULP(r6, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:34 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) 14:50:34 executing program 0 (fault-call:12 fault-nth:3): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="30dd96866c8619c7522155d10efb2cc5b0a761c91083a81d8483c1db9a56744d590452367251d70f3ce7bbb664fe975a105cadf789618f7a51abddc6ad6564ac6f08b316b1de15f1c2bb3f58722383a5a9c68233a39fba38b43f871fb52eabc279cf67bd8dc1cbc964fece03ffd57b8a789640692dbbb17fbe53bce58c461d9fae317cbf87901aed080b695e19f766bb1413ae000000000000002d1e15875ad5b244082fac18c28973c5677ba706d48f019a6973cc21278c6533c792f292e952ccbd96e0a9c5117a4d9b85f2ac4c72deaf542c3369a34dce3775f849be4a77095980f6eeb79a1798d8ca6e383267790219917c635f6d3db5000000000000009e47d7c7f5ee98e29287cfb1f09d4bfe4a6936fb96770f51d161ca774752e97b4cbba0cc84176c009586bfbea7fb1e7b9a995c6a175a694a30a64feed3730151503404777bc6b1bcea4755ab8aacc81ead62ebf576d13445d09fa510033c5a4971b48f0907477ceeaf717d4d429c70191b65a8e35197524bd11c988eff77ad06896a01c497c10034e2", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:34 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$sg(&(0x7f0000000180)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000040)={0x2c, 0x0, 0x0, "062a0678ec5612a4179b0be1e7a1e078ebc20f307f10ccc9dbc806e28e3918ac52c4bc6eac569662e9a8fdd0"}) r2 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r4, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r4, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r3, 0x0, r4, 0x0, 0x80000fffffffc, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @private1}, &(0x7f0000000140)=0x1c) [ 488.143225] FAULT_INJECTION: forcing a failure. [ 488.143225] name failslab, interval 1, probability 0, space 0, times 0 [ 488.191158] overlayfs: fs on './file0' does not support file handles, falling back to index=off. [ 488.202895] CPU: 1 PID: 25562 Comm: syz-executor.0 Not tainted 4.14.217-syzkaller #0 [ 488.210826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.220190] Call Trace: [ 488.222802] dump_stack+0x1b2/0x281 [ 488.226438] should_fail.cold+0x10a/0x149 [ 488.230683] should_failslab+0xd6/0x130 [ 488.234667] kmem_cache_alloc_node+0x263/0x410 [ 488.239255] __alloc_skb+0x5c/0x510 [ 488.242895] sk_stream_alloc_skb+0xb1/0x760 [ 488.247232] ? tcp_send_mss+0x9f/0x2e0 [ 488.251227] ? ipv6_frag_exit+0x40/0x40 [ 488.255290] do_tcp_sendpages+0x835/0x1750 [ 488.259541] ? gcmaes_encrypt.constprop.0+0x6d8/0xc00 [ 488.264766] ? sk_stream_alloc_skb+0x760/0x760 [ 488.269453] tls_push_sg+0x1ee/0x760 [ 488.273185] tls_push_record+0xa81/0x1270 [ 488.278251] tls_sw_sendpage+0x760/0xb50 [ 488.282373] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 488.286543] inet_sendpage+0x155/0x590 [ 488.290442] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 488.294789] ? inet_getname+0x3a0/0x3a0 [ 488.298770] sock_sendpage+0xdf/0x140 [ 488.302585] pipe_to_sendpage+0x226/0x2d0 [ 488.307355] ? sockfs_setattr+0x140/0x140 [ 488.311513] ? direct_splice_actor+0x160/0x160 [ 488.316114] __splice_from_pipe+0x326/0x7a0 [ 488.320451] ? direct_splice_actor+0x160/0x160 [ 488.325067] generic_splice_sendpage+0xc1/0x110 [ 488.329762] ? vmsplice_to_user+0x1b0/0x1b0 [ 488.334109] ? rw_verify_area+0xe1/0x2a0 [ 488.338360] ? vmsplice_to_user+0x1b0/0x1b0 [ 488.342703] SyS_splice+0xd59/0x1380 [ 488.346442] ? SyS_write+0x14d/0x210 [ 488.352007] ? compat_SyS_vmsplice+0x150/0x150 [ 488.356619] ? SyS_clock_settime+0x1a0/0x1a0 [ 488.361064] ? do_syscall_64+0x4c/0x640 [ 488.365061] ? compat_SyS_vmsplice+0x150/0x150 [ 488.369661] do_syscall_64+0x1d5/0x640 [ 488.373571] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 488.378804] RIP: 0033:0x45e219 [ 488.381262] kasan: CONFIG_KASAN_INLINE enabled 14:50:34 executing program 1: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)='0', 0x1}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5452, &(0x7f0000000080)=0x5af1) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$cgroup_type(r3, &(0x7f0000000180)='threaded\x00', 0x2d1ee37) splice(r3, 0x0, r1, 0x0, 0x4, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140), 0x4) [ 488.382392] RSP: 002b:00007fa193102c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 488.382404] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e219 [ 488.382409] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 488.382414] RBP: 00007fa193102ca0 R08: 00080000fffffffc R09: 0000000000000000 [ 488.382419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000003 [ 488.382424] R13: 00007fff6ffad10f R14: 00007fa1931039c0 R15: 000000000119bf8c [ 488.537849] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 488.549706] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 488.555968] Modules linked in: [ 488.559187] CPU: 0 PID: 25536 Comm: syz-executor.3 Not tainted 4.14.217-syzkaller #0 [ 488.567066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.576424] task: ffff888055fd4540 task.stack: ffff88809df58000 [ 488.582490] RIP: 0010:scatterwalk_copychunks+0x4a3/0x680 [ 488.588729] RSP: 0018:ffff88809df5f760 EFLAGS: 00010202 [ 488.594185] RAX: dffffc0000000000 RBX: 000000000000001e RCX: ffffc900082dd000 [ 488.601459] RDX: 0000000000000002 RSI: ffffffff83155024 RDI: ffff88805278d158 [ 488.608754] RBP: 0000000000000000 R08: 0000000000000001 R09: ffffed100b5ad003 [ 488.617590] R10: ffff88805ad6801d R11: 0000000000000010 R12: 000000000000001e [ 488.625039] R13: ffff88809df5f818 R14: 0000000000000001 R15: ffff88805278d164 [ 488.632315] FS: 00007f9439ae4700(0000) GS:ffff8880ba400000(0000) knlGS:0000000000000000 [ 488.640569] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 488.646470] CR2: 000055f8e17be160 CR3: 000000004ef4c000 CR4: 00000000001406f0 [ 488.653741] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 488.661029] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 488.668390] Call Trace: [ 488.671000] scatterwalk_map_and_copy+0x100/0x1a0 [ 488.675869] ? trace_hardirqs_on+0x10/0x10 [ 488.680119] ? scatterwalk_ffwd+0x420/0x420 [ 488.684459] ? aesni_gcm_enc_avx2+0xc0/0x170 [ 488.688877] ? kernel_fpu_end+0xf4/0x140 [ 488.692960] ? kernel_fpu_enable+0x30/0x30 [ 488.698958] gcmaes_encrypt.constprop.0+0x6cd/0xc00 [ 488.703988] ? generic_gcmaes_encrypt+0xf4/0x130 [ 488.708737] ? helper_rfc4106_encrypt+0x2b0/0x2b0 [ 488.713619] ? rcu_read_lock_sched_held+0x16c/0x1d0 [ 488.718719] ? __kmalloc+0x3a4/0x400 [ 488.722428] ? tls_push_record+0xfa/0x1270 [ 488.726678] ? cryptd_aead_child+0x9/0x40 [ 488.730839] ? tls_push_record+0x938/0x1270 [ 488.735173] ? tls_sw_sendpage+0x760/0xb50 [ 488.739406] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 488.743561] ? inet_sendpage+0x155/0x590 [ 488.747615] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 488.751766] ? inet_getname+0x3a0/0x3a0 [ 488.756414] ? sock_sendpage+0xdf/0x140 [ 488.760399] ? pipe_to_sendpage+0x226/0x2d0 [ 488.764747] ? sockfs_setattr+0x140/0x140 [ 488.769078] ? direct_splice_actor+0x160/0x160 [ 488.774407] ? __splice_from_pipe+0x326/0x7a0 [ 488.778915] ? direct_splice_actor+0x160/0x160 [ 488.783501] ? generic_splice_sendpage+0xc1/0x110 [ 488.788448] ? vmsplice_to_user+0x1b0/0x1b0 [ 488.793128] ? rw_verify_area+0xe1/0x2a0 [ 488.797195] ? vmsplice_to_user+0x1b0/0x1b0 [ 488.801516] ? SyS_splice+0xd59/0x1380 [ 488.805410] ? SyS_write+0x14d/0x210 [ 488.809119] ? compat_SyS_vmsplice+0x150/0x150 [ 488.813793] ? SyS_clock_settime+0x1a0/0x1a0 [ 488.818301] ? do_syscall_64+0x4c/0x640 [ 488.823509] ? compat_SyS_vmsplice+0x150/0x150 [ 488.828362] ? do_syscall_64+0x1d5/0x640 [ 488.832460] ? entry_SYSCALL_64_after_hwframe+0x46/0xbb 14:50:35 executing program 0 (fault-call:12 fault-nth:4): pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r1, &(0x7f0000000840)=[{&(0x7f0000000680)="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", 0xffffff32}], 0x1, 0x0) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) ioctl$int_in(r1, 0x5421, &(0x7f0000000080)=0x1020) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x303}, "eb12c65b9fb287e6", "a9eed07340def928fef63ce6342749bb", "0ce129a5", "c690a1980e729857"}, 0x28) splice(r0, 0x0, r1, 0x0, 0x80000fffffffc, 0x0) 14:50:35 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$security_capability(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.capability\x00', &(0x7f0000000480)=@v3, 0x18, 0x0) mount$overlay(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='lowerdir=.:file0']) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c42, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffff7ffffffffff, 0xffffffffffffffff, 0x0) chown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002f80)={0x0, 0x0, &(0x7f00000003c0)={0x18, 0x0, 0x0, {0x3e}}, &(0x7f0000002440)={0x18}, &(0x7f0000002480)={0x18}, &(0x7f00000024c0)={0x28, 0x0, 0x0, {{0x7f, 0x101, 0x1}}}, &(0x7f0000002500)={0x60, 0x0, 0x7, {{0x3aa, 0x0, 0x2, 0x0, 0x8, 0xc85, 0xfa, 0xfff}}}, &(0x7f0000002580)={0x18, 0x0, 0x8}, &(0x7f00000025c0)=ANY=[], 0x0, &(0x7f0000002640)={0x78, 0x0, 0x5a, {0x0, 0xd241, 0x0, {0x0, 0x800000000040, 0x3, 0x8, 0x0, 0x0, 0x9, 0x5, 0x8, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x100, 0x7}}}, &(0x7f00000026c0)={0x90, 0x0, 0x2, {0x5, 0x0, 0x0, 0x0, 0x800, 0x0, {0x6, 0x80000000, 0x0, 0x18c0, 0x0, 0x101, 0x1, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x80000000}}}, &(0x7f0000002840)=ANY=[], 0x0, &(0x7f0000002e80)={0xa0, 0x0, 0x2, {{0x5, 0x0, 0x0, 0x3, 0x8, 0x7, {0x0, 0x0, 0x0, 0x5, 0x4, 0x4, 0x6, 0x200, 0x4, 0x8000, 0x1f, 0xee01, 0x0, 0x4}}}}, &(0x7f0000002f40)={0x20, 0x0, 0x8, {0x3, 0x0, 0x2, 0xfff}}}) mkdir(&(0x7f0000000240)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f0000000040)='./bus\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='upperdir=./bus,workdir=./file1,lowerdir=./']) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f00000006c0)='security.capability\x00', 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000280)='./file1/../file0\x00', &(0x7f00000002c0)='./bus\x00') stat(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000180)='./bus\x00', &(0x7f00000001c0)='overlay\x00', 0x9000, &(0x7f00000004c0)={[{@default_permissions='default_permissions'}, {@index_off='index=off'}, {@redirect_dir={'redirect_dir', 0x3d, './bus/file0'}}, {@index_on='index=on'}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x63, 0x31, 0x30, 0x55, 0xff16cebeee35618f, 0x33, 0x63], 0x2d, [0x4d, 0x66, 0x61, 0x32], 0x2d, [0x64, 0x63, 0x4, 0x36], 0x2d, [0x56, 0x62, 0x36, 0x61], 0x2d, [0x39, 0x65, 0x61, 0x38, 0x30, 0x37, 0x66, 0x64]}}}, {@audit='audit'}, {@pcr={'pcr', 0x3d, 0x1d}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@subj_user={'subj_user', 0x3d, '+%]\x94]&'}}, {@obj_role={'obj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@audit='audit'}, {@appraise_type='appraise_type=imasig'}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) lchown(&(0x7f0000000000)='.\x00', 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080)='/dev/fuse\x00', 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100)='fuse\x00', 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, 0x0, {0x7, 0x1f, 0x0, 0x258448}}, 0x50) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000002780)={0x50, 0x0, 0x0, {0x7, 0x20, 0x3ff, 0x206, 0x9, 0x400, 0xa0, 0x101}}, 0x50) [ 488.837820] Code: fc ff df 80 3c 02 00 0f 85 d9 01 00 00 48 8d 45 10 49 89 6d 00 48 89 c2 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 81 01 00 00 48 b8 00 00 00 [ 488.857024] RIP: scatterwalk_copychunks+0x4a3/0x680 RSP: ffff88809df5f760 [ 488.923029] FAULT_INJECTION: forcing a failure. [ 488.923029] name failslab, interval 1, probability 0, space 0, times 0 [ 488.970393] CPU: 1 PID: 25585 Comm: syz-executor.0 Tainted: G D 4.14.217-syzkaller #0 [ 488.976493] ---[ end trace 4ab4cee0d2777258 ]--- [ 488.979649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 488.979653] Call Trace: [ 488.979674] dump_stack+0x1b2/0x281 [ 488.979690] should_fail.cold+0x10a/0x149 [ 488.984685] Kernel panic - not syncing: Fatal exception [ 488.993914] ? fs_reclaim_acquire+0xd4/0x120 [ 489.014082] should_failslab+0xd6/0x130 [ 489.018062] kmem_cache_alloc_node_trace+0x25a/0x400 [ 489.023962] __kmalloc_node_track_caller+0x38/0x70 [ 489.028900] __alloc_skb+0x96/0x510 [ 489.032553] sk_stream_alloc_skb+0xb1/0x760 [ 489.037014] ? tcp_send_mss+0x9f/0x2e0 [ 489.041024] ? ipv6_frag_exit+0x40/0x40 [ 489.045112] do_tcp_sendpages+0x835/0x1750 [ 489.049360] ? debug_object_activate+0x490/0x490 [ 489.054119] ? kernel_fpu_end+0xf4/0x140 [ 489.058203] ? sk_stream_alloc_skb+0x760/0x760 [ 489.062788] ? fs_reclaim_acquire+0xd4/0x120 [ 489.067847] tls_push_sg+0x1ee/0x760 [ 489.071571] tls_push_record+0xa81/0x1270 [ 489.075826] tls_sw_sendpage+0x760/0xb50 [ 489.080504] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 489.084649] inet_sendpage+0x155/0x590 [ 489.088622] ? tls_sw_sendmsg+0xfd0/0xfd0 [ 489.092771] ? inet_getname+0x3a0/0x3a0 [ 489.096753] sock_sendpage+0xdf/0x140 [ 489.100556] pipe_to_sendpage+0x226/0x2d0 [ 489.104918] ? sockfs_setattr+0x140/0x140 [ 489.109064] ? direct_splice_actor+0x160/0x160 [ 489.113746] __splice_from_pipe+0x326/0x7a0 [ 489.118066] ? direct_splice_actor+0x160/0x160 [ 489.122697] generic_splice_sendpage+0xc1/0x110 [ 489.127375] ? vmsplice_to_user+0x1b0/0x1b0 [ 489.131700] ? rw_verify_area+0xe1/0x2a0 [ 489.135764] ? vmsplice_to_user+0x1b0/0x1b0 [ 489.140099] SyS_splice+0xd59/0x1380 [ 489.143825] ? SyS_write+0x14d/0x210 [ 489.147562] ? compat_SyS_vmsplice+0x150/0x150 [ 489.152148] ? SyS_clock_settime+0x1a0/0x1a0 [ 489.156579] ? SyS_ioctl+0x5c/0xb0 [ 489.160125] ? compat_SyS_vmsplice+0x150/0x150 [ 489.164716] do_syscall_64+0x1d5/0x640 [ 489.168625] entry_SYSCALL_64_after_hwframe+0x46/0xbb [ 489.174171] RIP: 0033:0x45e219 [ 489.177383] RSP: 002b:00007fa193102c68 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 489.185100] RAX: ffffffffffffffda RBX: 0000000000000007 RCX: 000000000045e219 [ 489.192372] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000003 [ 489.199650] RBP: 00007fa193102ca0 R08: 00080000fffffffc R09: 0000000000000000 [ 489.206923] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 489.214305] R13: 00007fff6ffad10f R14: 00007fa1931039c0 R15: 000000000119bf8c [ 489.222212] Kernel Offset: disabled [ 489.225944] Rebooting in 86400 seconds..