pen_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x1100000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x3f00000000000000}, 0x0) 03:37:42 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0xfffff000, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:42 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x8847000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:42 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs4', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 761.108156] protocol 88fb is buggy, dev hsr_slave_0 [ 761.113317] protocol 88fb is buggy, dev hsr_slave_1 03:37:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xe000000}, 0x0) 03:37:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0e00004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:43 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x100000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x9effffff, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x4000000}, 0x0) [ 761.347466] overlayfs: unrecognized mount option "w" or missing value 03:37:43 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x883e000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x3f00, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:43 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x3c000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:43 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x9effffff}, 0x0) 03:37:43 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x8, 0x0, 0xffffca88}}}}}, 0x0) 03:37:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0xf, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) [ 761.626193] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x1c}, 0x0) [ 761.688608] overlayfs: unrecognized mount option "w" or missing value [ 761.714843] kauditd_printk_skb: 7 callbacks suppressed 03:37:43 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xfffffffffffff000, 0x0, 0xffffca88}}}}}, 0x0) [ 761.714859] audit: type=1804 audit(2000000263.504:181): pid=722 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/342/file0" dev="sda1" ino=17329 res=1 03:37:43 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x700, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x8, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 761.805435] audit: type=1804 audit(2000000263.504:182): pid=722 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/342/file0" dev="sda1" ino=17329 res=1 [ 761.831857] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xe}, 0x0) 03:37:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0xe, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) [ 761.914861] protocol 88fb is buggy, dev hsr_slave_0 [ 761.914867] protocol 88fb is buggy, dev hsr_slave_0 [ 761.914925] protocol 88fb is buggy, dev hsr_slave_1 [ 761.920281] protocol 88fb is buggy, dev hsr_slave_1 03:37:43 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x83', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:43 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xe0000001, 0x0, 0xffffca88}}}}}, 0x0) 03:37:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) [ 762.081458] overlayfs: unrecognized mount option "w" or missing value 03:37:43 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x3, 0x0, 0xffffca88}}}}}, 0x0) 03:37:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x3, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) [ 762.108320] audit: type=1804 audit(2000000263.891:183): pid=755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/343/file0" dev="sda1" ino=17329 res=1 [ 762.159279] audit: type=1804 audit(2000000263.921:184): pid=755 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/343/file0" dev="sda1" ino=17329 res=1 03:37:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x3f00000000000000, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:44 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x29a, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:44 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xe00000000000000}, 0x0) 03:37:44 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x608, 0x0, 0xffffca88}}}}}, 0x0) 03:37:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0xffffff9e, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:44 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 03:37:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x40030000000000, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:44 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xe000000100000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:44 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 762.561687] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 762.577664] overlayfs: unrecognized mount option "w" or missing value [ 762.603311] audit: type=1804 audit(2000000264.387:185): pid=787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/344/file0" dev="sda1" ino=17833 res=1 03:37:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x200000000000000, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) [ 762.672411] audit: type=1804 audit(2000000264.416:186): pid=787 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/344/file0" dev="sda1" ino=17833 res=1 03:37:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xfffff000}, 0x0) 03:37:44 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xf603, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:44 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x3f00000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:44 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:44 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0xc00e0000, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:44 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xffffdd86, 0x0, 0xffffca88}}}}}, 0x0) 03:37:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xc00e0000}, 0x0) [ 762.950559] overlayfs: unrecognized mount option "w" or missing value [ 762.958256] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:44 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 762.977850] audit: type=1804 audit(2000000264.754:187): pid=811 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/345/file0" dev="sda1" ino=17832 res=1 03:37:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0xfb0a, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) [ 763.046245] audit: type=1804 audit(2000000264.783:188): pid=811 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/345/file0" dev="sda1" ino=17832 res=1 03:37:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xf0ffffff}, 0x0) 03:37:44 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 763.129813] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:37:44 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x8003, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0xf00, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:45 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x40000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:45 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0xc00e, 0x0, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xf000}, 0x0) 03:37:45 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc4800004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:45 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x700, 0x0, 0xffffca88}}}}}, 0x0) [ 763.504595] overlayfs: unrecognized mount option "w" or missing value [ 763.528841] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x34000, {0x6, 0x40000}}, 0x14}}, 0x0) [ 763.549992] audit: type=1804 audit(2000000265.319:189): pid=851 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/346/file0" dev="sda1" ino=17836 res=1 03:37:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x1c00}, 0x0) 03:37:45 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc000f004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:45 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x894f000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:45 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x3e03000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x8000000, {0x6, 0x40000}}, 0x14}}, 0x0) [ 763.646465] audit: type=1804 audit(2000000265.349:190): pid=851 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/346/file0" dev="sda1" ino=17836 res=1 [ 763.737715] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:37:45 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x300000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:45 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:45 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xf00000000000000}, 0x0) 03:37:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xe00, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xa, {0x6, 0x40000}}, 0x14}}, 0x0) [ 763.918139] overlayfs: unrecognized mount option "w" or missing value 03:37:45 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x3000000}, 0x0) 03:37:45 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xd00000000000000, 0x0, 0xffffca88}}}}}, 0x0) [ 763.997853] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:45 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:45 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xe9030000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xf00}, 0x0) [ 764.119511] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xa00, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:46 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xd8', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:46 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x8848, 0x0, 0xffffca88}}}}}, 0x0) 03:37:46 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0007004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xf000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xf}, 0x0) 03:37:46 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:46 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x3e88, 0x0, 0xffffca88}}}}}, 0x0) [ 764.421383] overlayfs: unrecognized mount option "w" or missing value 03:37:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xe000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x300000000000000}, 0x0) 03:37:46 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x3f0, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:46 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:46 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xb00000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:46 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x6000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:46 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x100000000000000}, 0x0) 03:37:46 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xf0ffff, 0x0, 0xffffca88}}}}}, 0x0) 03:37:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x1000000000000000, {0x6, 0x40000}}, 0x14}}, 0x0) [ 764.832651] overlayfs: unrecognized mount option "w" or missing value 03:37:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x10000000}, 0x0) [ 764.877991] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:46 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x8f03000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:46 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xec0, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:46 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x14, 0x0, 0xffffca88}}}}}, 0x0) [ 765.020238] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:37:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x300000000000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:46 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x3f00}, 0x0) 03:37:46 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x1800000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:47 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 765.198449] overlayfs: unrecognized mount option "w" or missing value 03:37:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xc00e000000000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x60}, 0x0) 03:37:47 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xffffffff00000000, 0x0, 0xffffca88}}}}}, 0x0) [ 765.339016] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:47 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x3f4, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xffffff9e}, 0x0) 03:37:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x3000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:47 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:47 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x2000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:47 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfsz', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x3f00, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:47 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc7400004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xec0}, 0x0) 03:37:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x8, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:47 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x88640000, 0x0, 0xffffca88}}}}}, 0x0) [ 765.712144] overlayfs: unrecognized mount option "w" or missing value 03:37:47 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:47 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x600, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xfffffff0}, 0x0) 03:37:47 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x800e, 0x0, 0xffffca88}}}}}, 0x0) 03:37:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x100000000000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:47 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x10', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:47 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0fda004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 765.951544] overlayfs: unrecognized mount option "w" or missing value 03:37:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xf0ffff, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:47 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xffffff7f}, 0x0) 03:37:47 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x40010000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:47 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xffffa888, 0x0, 0xffffca88}}}}}, 0x0) 03:37:47 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xffffff9e, {0x6, 0x40000}}, 0x14}}, 0x0) [ 766.109667] net_ratelimit: 19 callbacks suppressed [ 766.109675] protocol 88fb is buggy, dev hsr_slave_0 [ 766.109689] protocol 88fb is buggy, dev hsr_slave_0 [ 766.114871] protocol 88fb is buggy, dev hsr_slave_1 [ 766.119881] protocol 88fb is buggy, dev hsr_slave_1 [ 766.130023] protocol 88fb is buggy, dev hsr_slave_0 [ 766.140133] protocol 88fb is buggy, dev hsr_slave_1 03:37:47 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x01', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:48 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x4305000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x300, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x300}, 0x0) 03:37:48 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0048004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x9effffff00000000, {0x6, 0x40000}}, 0x14}}, 0x0) [ 766.354805] overlayfs: unrecognized mount option "w" or missing value 03:37:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xe00}, 0x0) 03:37:48 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:48 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xf4030000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:48 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x89060000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xfb0a, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) 03:37:48 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x03', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:48 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xabfe, 0x0, 0xffffca88}}}}}, 0x0) 03:37:48 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xf0, {0x6, 0x40000}}, 0x14}}, 0x0) [ 766.749562] overlayfs: unrecognized mount option "w" or missing value [ 766.765126] protocol 88fb is buggy, dev hsr_slave_0 [ 766.765950] kauditd_printk_skb: 14 callbacks suppressed [ 766.765965] audit: type=1804 audit(2000000268.512:205): pid=1119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/354/file0" dev="sda1" ino=17858 res=1 [ 766.770294] protocol 88fb is buggy, dev hsr_slave_1 [ 766.785774] audit: type=1804 audit(2000000268.522:206): pid=1119 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/354/file0" dev="sda1" ino=17858 res=1 [ 766.799614] protocol 88fb is buggy, dev hsr_slave_0 [ 766.827978] protocol 88fb is buggy, dev hsr_slave_1 03:37:48 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xc, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x6000000000000000}, 0x0) 03:37:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x3f00000000000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:48 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x4788, 0x0, 0xffffca88}}}}}, 0x0) 03:37:48 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:48 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:48 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x1000000}, 0x0) 03:37:48 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x18, 0x0, 0xffffca88}}}}}, 0x0) 03:37:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x6000000000000000, {0x6, 0x40000}}, 0x14}}, 0x0) [ 767.106028] overlayfs: unrecognized mount option "w" or missing value [ 767.128554] audit: type=1804 audit(2000000268.869:207): pid=1146 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/355/file0" dev="sda1" ino=17864 res=1 03:37:48 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc1000004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:48 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x90, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xe00000000000000, {0x6, 0x40000}}, 0x14}}, 0x0) [ 767.248682] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x1000000000000000}, 0x0) 03:37:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:49 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x6558000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x10000000, {0x6, 0x40000}}, 0x14}}, 0x0) [ 767.401244] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x800000000000000}, 0x0) 03:37:49 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc1300004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:49 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x3000000, 0x0, 0xffffca88}}}}}, 0x0) [ 767.519106] overlayfs: unrecognized mount option "w" or missing value 03:37:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xc00e0000, {0x6, 0x40000}}, 0x14}}, 0x0) [ 767.553485] audit: type=1804 audit(2000000269.296:208): pid=1182 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/356/file0" dev="sda1" ino=17871 res=1 03:37:49 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xd, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x10}, 0x0) [ 767.660203] audit: type=1804 audit(2000000269.296:209): pid=1182 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/356/file0" dev="sda1" ino=17871 res=1 03:37:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x9effffff, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:49 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x81000000, 0x0, 0xffffca88}}}}}, 0x0) [ 767.713325] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x3}, 0x0) [ 767.830886] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x1000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:49 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xfeab, 0x0, 0xffffca88}}}}}, 0x0) 03:37:49 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x9effffff00000000}, 0x0) [ 767.971366] overlayfs: unrecognized mount option "w" or missing value [ 767.995432] audit: type=1804 audit(2000000269.722:210): pid=1220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/357/file0" dev="sda1" ino=16626 res=1 03:37:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xffffff7f00000000, {0x6, 0x40000}}, 0x14}}, 0x0) [ 768.090155] audit: type=1804 audit(2000000269.762:211): pid=1220 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/357/file0" dev="sda1" ino=16626 res=1 03:37:49 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x6002000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:49 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xa8ff000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:49 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0006004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:49 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x1c000000}, 0x0) 03:37:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x40030000000000, {0x6, 0x40000}}, 0x14}}, 0x0) [ 768.207330] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:50 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x800e0000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:50 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc04ff004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 768.310920] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x6000}, 0x0) 03:37:50 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xa00000000000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:50 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x88a8ffff00000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:50 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 768.502655] overlayfs: unrecognized mount option "w" or missing value [ 768.545100] audit: type=1804 audit(2000000270.268:212): pid=1255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/358/file0" dev="sda1" ino=16625 res=1 [ 768.598995] audit: type=1804 audit(2000000270.268:213): pid=1255 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/358/file0" dev="sda1" ino=16625 res=1 03:37:50 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x9602000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x34000}, 0x0) 03:37:50 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xaffe0000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xfb0a000000000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:50 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 768.668135] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xf, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:50 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 768.768738] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:50 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x88caffff00000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:50 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xa}, 0x0) 03:37:50 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:50 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x8100000000000000, 0x0, 0xffffca88}}}}}, 0x0) [ 769.020713] overlayfs: unrecognized mount option "w" or missing value [ 769.041531] audit: type=1804 audit(2000000270.763:214): pid=1292 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/359/file0" dev="sda1" ino=17809 res=1 03:37:50 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xfc03000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:50 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x40030000000000}, 0x0) 03:37:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xf000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:50 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:50 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x88beffff00000000, 0x0, 0xffffca88}}}}}, 0x0) [ 769.146706] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x2, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:51 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xf0ffffffffffff, 0x0, 0xffffca88}}}}}, 0x0) 03:37:51 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:51 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x8000000}, 0x0) 03:37:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x4, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:51 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x3f000000, 0x0, 0xffffca88}}}}}, 0x0) [ 769.544987] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 769.567136] overlayfs: unrecognized mount option "w" or missing value 03:37:51 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xe401, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xf0}, 0x0) 03:37:51 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc7a00004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x400000000000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:51 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xffffbe88, 0x0, 0xffffca88}}}}}, 0x0) [ 769.677198] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:37:51 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc6000004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:51 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:51 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x689, 0x0, 0xffffca88}}}}}, 0x0) 03:37:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x3f000000}, 0x0) 03:37:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x60, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:51 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x800000000000000, {0x6, 0x40000}}, 0x14}}, 0x0) [ 769.878854] overlayfs: unrecognized mount option "w" or missing value 03:37:51 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xb403, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 769.989527] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:51 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fcf000004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x4000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:51 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x86ddffff00000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0xf0ffff}, 0x0) [ 770.120605] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:51 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:51 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0400004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:52 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x300, 0x0, 0xffffca88}}}}}, 0x0) 03:37:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x3, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 770.259776] overlayfs: unrecognized mount option "w" or missing value 03:37:52 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:52 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xba02, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xfb0a0000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 03:37:52 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x8100, 0x0, 0xffffca88}}}}}, 0x0) [ 770.475729] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:52 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fcda0f004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xf00, {0x6, 0x40000}}, 0x14}}, 0x0) [ 770.598784] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:52 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x01', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:52 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xd000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 03:37:52 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 770.733132] overlayfs: unrecognized mount option "w" or missing value 03:37:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x10, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:52 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x2c4, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:52 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0013004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) 03:37:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xfffff000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:52 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x14000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x6000000000000000}, 0x0) 03:37:52 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:52 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\a', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xffffff7f, {0x6, 0x40000}}, 0x14}}, 0x0) [ 771.118605] overlayfs: unrecognized mount option "w" or missing value 03:37:52 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x8035, 0x0, 0xffffca88}}}}}, 0x0) 03:37:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xe}, 0x0) 03:37:53 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:53 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x234, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xa000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:53 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x894f, 0x0, 0xffffca88}}}}}, 0x0) 03:37:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x3f00000000000000}, 0x0) 03:37:53 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc4c00004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xffffffff00000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:53 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xa4', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:53 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x4f89, 0x0, 0xffffca88}}}}}, 0x0) 03:37:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) 03:37:53 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 771.591995] overlayfs: unrecognized mount option "w" or missing value [ 771.595251] net_ratelimit: 23 callbacks suppressed [ 771.595260] protocol 88fb is buggy, dev hsr_slave_0 [ 771.608681] protocol 88fb is buggy, dev hsr_slave_1 03:37:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x60000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:53 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x8002000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:53 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x806000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xc00e, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:53 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xe00}, 0x0) 03:37:53 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x8000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xfffffffffffff000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:53 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:53 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf0}, 0x0) [ 772.035693] overlayfs: unrecognized mount option "w" or missing value 03:37:53 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xaffe000000000000, 0x0, 0xffffca88}}}}}, 0x0) [ 772.087227] kauditd_printk_skb: 13 callbacks suppressed [ 772.087243] audit: type=1804 audit(2000000273.778:228): pid=1514 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/366/file0" dev="sda1" ino=17838 res=1 03:37:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xfffffff0, {0x6, 0x40000}}, 0x14}}, 0x0) [ 772.142670] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 772.161215] audit: type=1804 audit(2000000273.818:229): pid=1514 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/366/file0" dev="sda1" ino=17838 res=1 03:37:54 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xed030000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:54 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:54 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x8906000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xafb, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:54 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 03:37:54 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x8864000000000000, 0x0, 0xffffca88}}}}}, 0x0) [ 772.401909] protocol 88fb is buggy, dev hsr_slave_0 [ 772.401914] protocol 88fb is buggy, dev hsr_slave_0 [ 772.401969] protocol 88fb is buggy, dev hsr_slave_1 [ 772.407037] protocol 88fb is buggy, dev hsr_slave_1 [ 772.422241] protocol 88fb is buggy, dev hsr_slave_0 [ 772.427333] protocol 88fb is buggy, dev hsr_slave_1 03:37:54 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xf00000000000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) [ 772.459311] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:54 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0xffa8, 0x0, 0xffffca88}}}}}, 0x0) 03:37:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x400000000000000}, 0x0) [ 772.632469] overlayfs: unrecognized mount option "w" or missing value [ 772.640605] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue [ 772.685750] audit: type=1804 audit(2000000274.383:230): pid=1571 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/367/file0" dev="sda1" ino=16881 res=1 [ 772.720495] audit: type=1804 audit(2000000274.383:231): pid=1587 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/367/file0" dev="sda1" ino=16881 res=1 03:37:54 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xde030000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xf0ffffffffffff, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:54 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x4888, 0x0, 0xffffca88}}}}}, 0x0) 03:37:54 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:54 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:54 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 03:37:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xf0ffffff00000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:54 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x6000000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:54 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 773.047241] protocol 88fb is buggy, dev hsr_slave_0 [ 773.052382] protocol 88fb is buggy, dev hsr_slave_1 03:37:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x200000000000000, {0x6, 0x40000}}, 0x14}}, 0x0) [ 773.128848] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:54 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x1000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:54 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 773.204506] overlayfs: unrecognized mount option "w" or missing value [ 773.226502] audit: type=1804 audit(2000000274.909:232): pid=1616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/368/file0" dev="sda1" ino=16881 res=1 03:37:55 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xe903000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x60}, 0x0) 03:37:55 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x400300, {0x6, 0x40000}}, 0x14}}, 0x0) [ 773.315439] audit: type=1804 audit(2000000274.948:233): pid=1616 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/368/file0" dev="sda1" ino=16881 res=1 [ 773.340503] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:55 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:55 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x6000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x0) 03:37:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xe, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:55 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 03:37:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0xf0ffffff, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:55 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x8060000, 0x0, 0xffffca88}}}}}, 0x0) [ 773.576599] overlayfs: unrecognized mount option "w" or missing value [ 773.605035] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 773.610963] audit: type=1804 audit(2000000275.295:234): pid=1639 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/369/file0" dev="sda1" ino=16577 res=1 [ 773.685858] audit: type=1804 audit(2000000275.345:235): pid=1639 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/369/file0" dev="sda1" ino=16577 res=1 [ 773.725781] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:55 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x700000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:55 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:55 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x4000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 03:37:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x3f000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:55 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x7f', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:55 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:55 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x1000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x400300}, 0x0) 03:37:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x2000000, {0x6, 0x40000}}, 0x14}}, 0x0) 03:37:55 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x88a8ffff, 0x0, 0xffffca88}}}}}, 0x0) 03:37:55 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000684a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 774.044233] overlayfs: unrecognized mount option "w" or missing value [ 774.073894] audit: type=1804 audit(2000000275.752:236): pid=1676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/370/file0" dev="sda1" ino=16609 res=1 [ 774.134347] audit: type=1804 audit(2000000275.811:237): pid=1676 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/370/file0" dev="sda1" ino=16609 res=1 03:37:55 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x9a020000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x3, 0x40000}}, 0x14}}, 0x0) 03:37:55 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:55 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 03:37:55 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x4000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:56 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x4, 0x40000}}, 0x14}}, 0x0) 03:37:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:37:56 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:56 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x88470000, 0x0, 0xffffca88}}}}}, 0x0) [ 774.448298] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:56 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x4, 0x0, 0xffffca88}}}}}, 0x0) 03:37:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x5, 0x40000}}, 0x14}}, 0x0) [ 774.536316] overlayfs: unrecognized mount option "w" or missing value 03:37:56 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xd8030000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x1c00000000000000}, 0x0) 03:37:56 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:56 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x3580, 0x0, 0xffffca88}}}}}, 0x0) 03:37:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x2, 0x40000}}, 0x14}}, 0x0) [ 774.669284] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:56 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xff', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x4000e}}, 0x14}}, 0x0) 03:37:56 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:56 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x700000000000000, 0x0, 0xffffca88}}}}}, 0x0) 03:37:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x3}, 0x0) 03:37:56 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:56 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xffffa888, 0xffffca88}}}}}, 0x0) [ 774.909090] overlayfs: unrecognized mount option "w" or missing value 03:37:56 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x8f030000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 03:37:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40e00}}, 0x14}}, 0x0) 03:37:56 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:56 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xfeaf, 0xffffca88}}}}}, 0x0) 03:37:56 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x02', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:56 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x1c000000}, 0x0) 03:37:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40004}}, 0x14}}, 0x0) 03:37:56 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc000f004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:56 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x1000000000000, 0xffffca88}}}}}, 0x0) 03:37:56 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:56 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40003}}, 0x14}}, 0x0) [ 775.368376] overlayfs: unrecognized mount option "w" or missing value 03:37:57 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x74020000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 03:37:57 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40008}}, 0x14}}, 0x0) 03:37:57 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x3e8, 0xffffca88}}}}}, 0x0) 03:37:57 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfsh', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 03:37:57 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x4000f}}, 0x14}}, 0x0) 03:37:57 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xf0ffff, 0xffffca88}}}}}, 0x0) 03:37:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40010}}, 0x14}}, 0x0) 03:37:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xc00e}, 0x0) [ 775.751653] overlayfs: unrecognized mount option "w" or missing value 03:37:57 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:57 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x1e4, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:57 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x88a8ffff, 0xffffca88}}}}}, 0x0) 03:37:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x4000a}}, 0x14}}, 0x0) 03:37:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 03:37:57 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\t', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:57 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000134a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:57 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xffa8, 0xffffca88}}}}}, 0x0) 03:37:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40f00}}, 0x14}}, 0x0) 03:37:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) 03:37:57 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:57 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x600000000000000, 0xffffca88}}}}}, 0x0) 03:37:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40afb}}, 0x14}}, 0x0) [ 776.148348] overlayfs: unrecognized mount option "w" or missing value 03:37:57 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x146, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:57 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xffffffff00000000}, 0x0) 03:37:57 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x800000000000000, 0xffffca88}}}}}, 0x0) 03:37:57 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc00007a4a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:37:58 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x46000}}, 0x14}}, 0x0) 03:37:58 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:58 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x88480000, 0xffffca88}}}}}, 0x0) 03:37:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xa00000000000000}, 0x0) [ 776.429581] overlayfs: unrecognized mount option "w" or missing value [ 776.458842] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x4fb0a}}, 0x14}}, 0x0) 03:37:58 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x382, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:58 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x800e000000000000, 0xffffca88}}}}}, 0x0) [ 776.548417] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:58 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:58 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 03:37:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40060}}, 0x14}}, 0x0) 03:37:58 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:58 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x3580, 0xffffca88}}}}}, 0x0) 03:37:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf000}, 0x0) [ 776.753560] overlayfs: unrecognized mount option "w" or missing value [ 776.781783] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40002}}, 0x14}}, 0x0) 03:37:58 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x600000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:58 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 776.876690] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x300}, 0x0) 03:37:58 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x60, 0xffffca88}}}}}, 0x0) 03:37:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40a00}}, 0x14}}, 0x0) 03:37:58 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:58 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:58 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x2}, 0x0) 03:37:58 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x689, 0xffffca88}}}}}, 0x0) 03:37:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x400f0}}, 0x14}}, 0x0) [ 777.117528] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 777.138240] overlayfs: unrecognized mount option "w" or missing value [ 777.158411] kauditd_printk_skb: 14 callbacks suppressed 03:37:58 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 777.158426] audit: type=1804 audit(2000000278.816:252): pid=1940 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/378/file0" dev="sda1" ino=17217 res=1 03:37:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x4f000}}, 0x14}}, 0x0) [ 777.252121] net_ratelimit: 19 callbacks suppressed [ 777.252129] protocol 88fb is buggy, dev hsr_slave_0 [ 777.262300] protocol 88fb is buggy, dev hsr_slave_1 [ 777.322747] protocol 88fb is buggy, dev hsr_slave_0 [ 777.327955] protocol 88fb is buggy, dev hsr_slave_1 03:37:59 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xf400000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x8}, 0x0) 03:37:59 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x89060000, 0xffffca88}}}}}, 0x0) 03:37:59 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:59 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40ec0}}, 0x14}}, 0x0) 03:37:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x9effffff00000000}, 0x0) 03:37:59 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:59 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4305000000000000, 0xffffca88}}}}}, 0x0) 03:37:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40300}}, 0x14}}, 0x0) [ 777.505710] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:37:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x300000000000000}, 0x0) 03:37:59 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 777.662489] overlayfs: unrecognized mount option "w" or missing value [ 777.688575] audit: type=1804 audit(2000000279.342:253): pid=1980 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/379/file0" dev="sda1" ino=16817 res=1 [ 777.774948] audit: type=1804 audit(2000000279.371:254): pid=1980 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/379/file0" dev="sda1" ino=16817 res=1 [ 777.887421] protocol 88fb is buggy, dev hsr_slave_0 [ 777.892598] protocol 88fb is buggy, dev hsr_slave_1 03:37:59 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x2000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:37:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x43f00}}, 0x14}}, 0x0) 03:37:59 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xe8030000, 0xffffca88}}}}}, 0x0) 03:37:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) 03:37:59 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x03', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:37:59 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:59 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x81000000, 0xffffca88}}}}}, 0x0) 03:37:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 03:37:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x4c00e}}, 0x14}}, 0x0) 03:37:59 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:37:59 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xffffff9e}}, 0x14}}, 0x0) 03:37:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x34000}, 0x0) [ 778.254696] overlayfs: unrecognized mount option "w" or missing value [ 778.292309] audit: type=1804 audit(2000000279.946:255): pid=2017 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/380/file0" dev="sda1" ino=17265 res=1 [ 778.325013] audit: type=1804 audit(2000000279.976:256): pid=2017 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/380/file0" dev="sda1" ino=17265 res=1 03:38:00 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:00 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xb00, 0xffffca88}}}}}, 0x0) 03:38:00 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x40030000000000}}, 0x14}}, 0x0) 03:38:00 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x2a4, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xe00000000000000}, 0x0) 03:38:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x800000000000000}}, 0x14}}, 0x0) 03:38:00 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0010004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffff000}, 0x0) [ 778.523699] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:00 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x1800, 0xffffca88}}}}}, 0x0) 03:38:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xf0ffffffffffff}}, 0x14}}, 0x0) [ 778.635726] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 778.652297] overlayfs: unrecognized mount option "w" or missing value 03:38:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 03:38:00 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 778.694107] protocol 88fb is buggy, dev hsr_slave_0 [ 778.694161] protocol 88fb is buggy, dev hsr_slave_0 [ 778.699213] protocol 88fb is buggy, dev hsr_slave_1 [ 778.704324] protocol 88fb is buggy, dev hsr_slave_1 [ 778.719089] audit: type=1804 audit(2000000280.363:257): pid=2044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/381/file0" dev="sda1" ino=17377 res=1 03:38:00 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xf}}, 0x14}}, 0x0) 03:38:00 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e, 0xffffca88}}}}}, 0x0) 03:38:00 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x4001, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x4}}, 0x14}}, 0x0) [ 778.822863] audit: type=1804 audit(2000000280.363:258): pid=2044 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/381/file0" dev="sda1" ino=17377 res=1 03:38:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xf0ffff}}, 0x14}}, 0x0) 03:38:00 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x1c}, 0x0) 03:38:00 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4305, 0xffffca88}}}}}, 0x0) [ 778.993256] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x60000000}}, 0x14}}, 0x0) [ 779.083929] overlayfs: unrecognized mount option "w" or missing value 03:38:00 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xabfe0000, 0xffffca88}}}}}, 0x0) [ 779.141960] audit: type=1804 audit(2000000280.780:259): pid=2082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/382/file0" dev="sda1" ino=16579 res=1 [ 779.156007] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:00 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 779.238705] audit: type=1804 audit(2000000280.809:260): pid=2082 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/382/file0" dev="sda1" ino=16579 res=1 03:38:00 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xf8', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:00 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xfeab, 0xffffca88}}}}}, 0x0) 03:38:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xfffffff0}}, 0x14}}, 0x0) 03:38:00 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xec0}, 0x0) 03:38:00 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xd801, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:01 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x10000000}}, 0x14}}, 0x0) 03:38:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) 03:38:01 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0074004a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:01 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xaffe000000000000, 0xffffca88}}}}}, 0x0) 03:38:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x60}}, 0x14}}, 0x0) [ 779.526161] overlayfs: unrecognized mount option "w" or missing value 03:38:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) [ 779.574044] audit: type=1804 audit(2000000281.206:261): pid=2114 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/383/file0" dev="sda1" ino=17361 res=1 03:38:01 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xd8', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:01 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8848000000000000, 0xffffca88}}}}}, 0x0) 03:38:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x3f000000}}, 0x14}}, 0x0) 03:38:01 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xa00, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:01 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xa}, 0x0) 03:38:01 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x6558000000000000, 0xffffca88}}}}}, 0x0) 03:38:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xc00e0000}}, 0x14}}, 0x0) 03:38:01 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) [ 779.940463] overlayfs: unrecognized mount option "w" or missing value 03:38:01 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x9effffff}}, 0x14}}, 0x0) 03:38:01 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:01 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xe000000100000000, 0xffffca88}}}}}, 0x0) 03:38:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xfb0a}}, 0x14}}, 0x0) 03:38:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) 03:38:01 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x2ba, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:01 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:01 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf00000000000000}, 0x0) 03:38:01 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xe000000}}, 0x14}}, 0x0) 03:38:01 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xfffff000, 0xffffca88}}}}}, 0x0) 03:38:01 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 780.349285] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xffffffff00000000}}, 0x14}}, 0x0) [ 780.408512] overlayfs: unrecognized mount option "w" or missing value 03:38:02 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8000000, 0xffffca88}}}}}, 0x0) [ 780.470637] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:02 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xc00e0000}, 0x0) 03:38:02 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:02 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x8003000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xe00000000000000}}, 0x14}}, 0x0) 03:38:02 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xa8ff000000000000, 0xffffca88}}}}}, 0x0) 03:38:02 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000074a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf}, 0x0) 03:38:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xf00000000000000}}, 0x14}}, 0x0) 03:38:02 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x7, 0xffffca88}}}}}, 0x0) [ 780.787075] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 780.807483] overlayfs: unrecognized mount option "w" or missing value 03:38:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x1000000000000000}}, 0x14}}, 0x0) 03:38:02 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 780.955022] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:38:02 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x02', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xc00e000000000000}, 0x0) 03:38:02 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x3, 0xffffca88}}}}}, 0x0) 03:38:02 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x26020000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xa000000}}, 0x14}}, 0x0) 03:38:02 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 03:38:02 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x6, 0xffffca88}}}}}, 0x0) 03:38:02 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x8}}, 0x14}}, 0x0) 03:38:02 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 781.237972] overlayfs: unrecognized mount option "w" or missing value 03:38:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 03:38:03 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xed03, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:03 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x8c', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xffffff7f00000000}}, 0x14}}, 0x0) 03:38:03 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:03 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x2, 0xffffca88}}}}}, 0x0) 03:38:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 03:38:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xf000}}, 0x14}}, 0x0) 03:38:03 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 781.584228] overlayfs: unrecognized mount option "w" or missing value 03:38:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 03:38:03 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x6488, 0xffffca88}}}}}, 0x0) 03:38:03 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:03 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x2801, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x10}}, 0x14}}, 0x0) 03:38:03 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xe9', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x1c00}, 0x0) 03:38:03 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xd00000000000000, 0xffffca88}}}}}, 0x0) 03:38:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x6000000000000000}}, 0x14}}, 0x0) 03:38:03 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x800000000000000}, 0x0) 03:38:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x100000000000000}}, 0x14}}, 0x0) [ 781.965481] overlayfs: unrecognized mount option "w" or missing value 03:38:03 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x88caffff00000000, 0xffffca88}}}}}, 0x0) 03:38:03 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000084a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 03:38:03 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x1200, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xf000000}}, 0x14}}, 0x0) 03:38:03 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:03 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x3e88, 0xffffca88}}}}}, 0x0) 03:38:03 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x300}}, 0x14}}, 0x0) 03:38:03 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x2}}, 0x14}}, 0x0) 03:38:04 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 782.371151] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:04 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x40000000, 0xffffca88}}}}}, 0x0) [ 782.418677] 9pnet: Insufficient options for proto=fd [ 782.433663] overlayfs: unrecognized mount option "w" or missing value 03:38:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 782.484262] kauditd_printk_skb: 11 callbacks suppressed [ 782.484277] audit: type=1804 audit(2000000284.092:273): pid=2358 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/390/file0" dev="sda1" ino=17762 res=1 [ 782.551230] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:04 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x3f00, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xa}}, 0x14}}, 0x0) [ 782.612065] audit: type=1804 audit(2000000284.141:274): pid=2364 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/390/file0" dev="sda1" ino=17762 res=1 03:38:04 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:04 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:04 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x800e0000, 0xffffca88}}}}}, 0x0) 03:38:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:04 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xf0ffffff00000000}}, 0x14}}, 0x0) [ 782.732192] audit: type=1800 audit(2000000284.141:275): pid=2364 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor1" name="file0" dev="sda1" ino=17762 res=0 [ 782.866576] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 782.888951] net_ratelimit: 20 callbacks suppressed [ 782.888960] protocol 88fb is buggy, dev hsr_slave_0 [ 782.898988] protocol 88fb is buggy, dev hsr_slave_0 [ 782.899033] protocol 88fb is buggy, dev hsr_slave_1 [ 782.904109] protocol 88fb is buggy, dev hsr_slave_1 03:38:04 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x14000000, 0xffffca88}}}}}, 0x0) [ 782.909151] protocol 88fb is buggy, dev hsr_slave_0 [ 782.919164] protocol 88fb is buggy, dev hsr_slave_1 [ 782.935876] overlayfs: unrecognized mount option "w" or missing value 03:38:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x3000000}}, 0x14}}, 0x0) 03:38:04 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 782.967417] audit: type=1804 audit(2000000284.568:276): pid=2389 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/391/file0" dev="sda1" ino=17649 res=1 [ 783.027234] audit: type=1804 audit(2000000284.568:277): pid=2389 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/391/file0" dev="sda1" ino=17649 res=1 03:38:04 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x11000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:04 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xf000, 0xffffca88}}}}}, 0x0) 03:38:04 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xffffff7f}}, 0x14}}, 0x0) 03:38:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:04 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xfffffffffffff000}}, 0x14}}, 0x0) 03:38:04 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:04 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xe803000000000000, 0xffffca88}}}}}, 0x0) [ 783.296518] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:04 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:05 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x894f000000000000, 0xffffca88}}}}}, 0x0) [ 783.399799] overlayfs: unrecognized mount option "w" or missing value 03:38:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xe}}, 0x14}}, 0x0) 03:38:05 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x03', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 783.455127] audit: type=1804 audit(2000000285.064:278): pid=2429 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/392/file0" dev="sda1" ino=17665 res=1 [ 783.534301] protocol 88fb is buggy, dev hsr_slave_0 [ 783.539429] protocol 88fb is buggy, dev hsr_slave_1 03:38:05 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x54000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:05 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 783.561569] audit: type=1804 audit(2000000285.083:279): pid=2429 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/392/file0" dev="sda1" ino=17665 res=1 03:38:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xafb}}, 0x14}}, 0x0) [ 783.614946] protocol 88fb is buggy, dev hsr_slave_0 [ 783.620096] protocol 88fb is buggy, dev hsr_slave_1 03:38:05 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xa8ff0000, 0xffffca88}}}}}, 0x0) 03:38:05 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000124a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x3}}, 0x14}}, 0x0) 03:38:05 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xbc', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 783.843265] overlayfs: unrecognized mount option "w" or missing value 03:38:05 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x1400, 0xffffca88}}}}}, 0x0) 03:38:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:05 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 783.883412] audit: type=1804 audit(2000000285.480:280): pid=2463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/393/file0" dev="sda1" ino=16561 res=1 [ 783.948724] audit: type=1804 audit(2000000285.480:281): pid=2463 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/393/file0" dev="sda1" ino=16561 res=1 03:38:05 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x140, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xa00000000000000}}, 0x14}}, 0x0) 03:38:05 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:05 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xa8ff, 0xffffca88}}}}}, 0x0) 03:38:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x400000000000000}}, 0x14}}, 0x0) 03:38:05 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x1800000000000000, 0xffffca88}}}}}, 0x0) 03:38:05 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:05 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:05 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:05 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x300000000000000}}, 0x14}}, 0x0) [ 784.393113] overlayfs: unrecognized mount option "w" or missing value [ 784.400664] audit: type=1804 audit(2000000285.996:282): pid=2497 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/394/file0" dev="sda1" ino=16580 res=1 03:38:06 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x200000000000000, 0xffffca88}}}}}, 0x0) [ 784.437281] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:06 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x3c2, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xe00}}, 0x14}}, 0x0) 03:38:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:06 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x7000000, 0xffffca88}}}}}, 0x0) [ 784.574033] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x200000000000000}}, 0x14}}, 0x0) 03:38:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:06 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:06 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4000000, 0xffffca88}}}}}, 0x0) 03:38:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xc00e}}, 0x14}}, 0x0) [ 784.729620] overlayfs: unrecognized mount option "w" or missing value 03:38:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:06 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x280, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:06 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x3f00, 0xffffca88}}}}}, 0x0) [ 784.826415] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x4000000}}, 0x14}}, 0x0) 03:38:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000684a000700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 784.928582] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:06 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:06 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4788, 0xffffca88}}}}}, 0x0) 03:38:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x2000000}}, 0x14}}, 0x0) [ 785.066665] overlayfs: unrecognized mount option "w" or missing value 03:38:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xf0ffffff}}, 0x14}}, 0x0) 03:38:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:06 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x3e9, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) [ 785.260889] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:06 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x86ddffff00000000, 0xffffca88}}}}}, 0x0) 03:38:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:06 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:06 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xc00e000000000000}}, 0x14}}, 0x0) [ 785.444210] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 785.496238] overlayfs: unrecognized mount option "w" or missing value 03:38:07 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xf0}}, 0x14}}, 0x0) 03:38:07 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8847, 0xffffca88}}}}}, 0x0) 03:38:07 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:07 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x8000000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x6000}}, 0x14}}, 0x0) 03:38:07 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xe0000001, 0xffffca88}}}}}, 0x0) 03:38:07 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 785.738012] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x34000}}, 0x14}}, 0x0) [ 785.837367] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:07 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:07 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x3000000, 0xffffca88}}}}}, 0x0) 03:38:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:07 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 785.912720] overlayfs: unrecognized mount option "w" or missing value 03:38:07 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x806, 0xffffca88}}}}}, 0x0) 03:38:07 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x14000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xfb0a000000000000}}, 0x14}}, 0x0) 03:38:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 786.095729] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:07 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:07 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xffffdd86, 0xffffca88}}}}}, 0x0) 03:38:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:07 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x3f00000000000000}}, 0x14}}, 0x0) [ 786.209710] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:07 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:07 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 786.322198] overlayfs: unrecognized mount option "w" or missing value 03:38:07 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x88beffff00000000, 0xffffca88}}}}}, 0x0) 03:38:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x8000000}}, 0x14}}, 0x0) 03:38:08 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x380, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:08 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 786.490336] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xa00}}, 0x14}}, 0x0) 03:38:08 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e000000000000, 0xffffca88}}}}}, 0x0) 03:38:08 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 786.638607] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xec0}}, 0x14}}, 0x0) 03:38:08 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:08 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x02', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:08 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x1400000000000000, 0xffffca88}}}}}, 0x0) [ 786.806095] overlayfs: unrecognized mount option "w" or missing value 03:38:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:08 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x8, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x9effffff00000000}}, 0x14}}, 0x0) 03:38:08 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:08 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x18000000, 0xffffca88}}}}}, 0x0) 03:38:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xfffff000}}, 0x14}}, 0x0) 03:38:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:08 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:08 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:08 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8864, 0xffffca88}}}}}, 0x0) 03:38:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x1000000}}, 0x14}}, 0x0) [ 787.187439] overlayfs: unrecognized mount option "w" or missing value [ 787.196605] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:08 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:08 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xf0, 0xffffca88}}}}}, 0x0) 03:38:08 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x200000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:08 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:08 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xfb0a0000}}, 0x14}}, 0x0) [ 787.304258] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:09 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xe80, 0xffffca88}}}}}, 0x0) 03:38:09 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 787.453947] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x400300}}, 0x14}}, 0x0) 03:38:09 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:09 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4000000000000000, 0xffffca88}}}}}, 0x0) [ 787.605057] overlayfs: unrecognized mount option "w" or missing value [ 787.629676] kauditd_printk_skb: 14 callbacks suppressed 03:38:09 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 787.629691] audit: type=1804 audit(2000000289.199:297): pid=2777 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/402/file0" dev="sda1" ino=16565 res=1 03:38:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0xf00}}, 0x14}}, 0x0) [ 787.688904] audit: type=1804 audit(2000000289.199:298): pid=2777 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/402/file0" dev="sda1" ino=16565 res=1 03:38:09 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xd803, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000, 0x3f00}}, 0x14}}, 0x0) 03:38:09 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a100700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:09 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x43050000, 0xffffca88}}}}}, 0x0) [ 787.840709] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0xc0}}, 0x0) 03:38:09 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 787.991822] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 788.068116] overlayfs: unrecognized mount option "w" or missing value 03:38:09 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0xec0}}, 0x0) 03:38:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:09 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x86ddffff, 0xffffca88}}}}}, 0x0) 03:38:09 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xde03000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) [ 788.110444] audit: type=1804 audit(2000000289.675:299): pid=2815 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/403/file0" dev="sda1" ino=17903 res=1 [ 788.127863] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:09 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xe803, 0xffffca88}}}}}, 0x0) 03:38:09 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 788.224398] audit: type=1804 audit(2000000289.675:300): pid=2820 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/403/file0" dev="sda1" ino=17903 res=1 03:38:09 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0xf}}, 0x0) 03:38:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 788.289628] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 788.374454] net_ratelimit: 24 callbacks suppressed [ 788.374461] protocol 88fb is buggy, dev hsr_slave_0 [ 788.384550] protocol 88fb is buggy, dev hsr_slave_1 03:38:10 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4888, 0xffffca88}}}}}, 0x0) 03:38:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0xfffffdef}}, 0x0) [ 788.423634] overlayfs: unrecognized mount option "w" or missing value [ 788.451444] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:10 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 788.462303] audit: type=1804 audit(2000000290.022:301): pid=2840 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/404/file0" dev="sda1" ino=16577 res=1 03:38:10 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:10 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xb, 0xffffca88}}}}}, 0x0) 03:38:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x20000054}}, 0x0) [ 788.554297] audit: type=1804 audit(2000000290.052:302): pid=2847 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/404/file0" dev="sda1" ino=16577 res=1 03:38:10 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x101000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x7ffff000}}, 0x0) 03:38:10 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a030700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 788.698010] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:10 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xd, 0xffffca88}}}}}, 0x0) 03:38:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 788.768318] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x33fe0}}, 0x0) 03:38:10 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a740700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 788.829893] PF_CAN: dropped non conform CAN FD skbuf: dev type 778, len 65195, datalen 0 03:38:10 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:10 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xabfe000000000000, 0xffffca88}}}}}, 0x0) 03:38:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:10 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 789.003698] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 789.041333] overlayfs: unrecognized mount option "w" or missing value 03:38:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x3}, 0x0) [ 789.051190] audit: type=1804 audit(2000000290.607:303): pid=2885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/405/file0" dev="sda1" ino=16561 res=1 [ 789.108415] audit: type=1804 audit(2000000290.637:304): pid=2885 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/405/file0" dev="sda1" ino=16561 res=1 [ 789.133689] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:10 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x8f03, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:10 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8906000000000000, 0xffffca88}}}}}, 0x0) 03:38:10 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0xe}, 0x0) [ 789.181157] protocol 88fb is buggy, dev hsr_slave_0 [ 789.181171] protocol 88fb is buggy, dev hsr_slave_0 [ 789.186251] protocol 88fb is buggy, dev hsr_slave_1 [ 789.191350] protocol 88fb is buggy, dev hsr_slave_1 [ 789.201444] protocol 88fb is buggy, dev hsr_slave_0 [ 789.206519] protocol 88fb is buggy, dev hsr_slave_1 03:38:10 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:10 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x1000000, 0xffffca88}}}}}, 0x0) 03:38:10 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x8}, 0x0) 03:38:10 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:10 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 789.424035] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:11 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4f89, 0xffffca88}}}}}, 0x0) 03:38:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0xffffff1f}, 0x0) [ 789.555239] overlayfs: unrecognized mount option "w" or missing value [ 789.577209] audit: type=1804 audit(2000000291.133:305): pid=2919 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/406/file0" dev="sda1" ino=17618 res=1 [ 789.612176] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:11 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xb402, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x300}, 0x0) 03:38:11 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:11 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x6558, 0xffffca88}}}}}, 0x0) [ 789.655704] audit: type=1804 audit(2000000291.163:306): pid=2919 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/406/file0" dev="sda1" ino=17618 res=1 03:38:11 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:11 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4000, 0xffffca88}}}}}, 0x0) 03:38:11 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x6}, 0x0) [ 789.826516] protocol 88fb is buggy, dev hsr_slave_0 [ 789.831641] protocol 88fb is buggy, dev hsr_slave_1 [ 789.893289] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 789.918107] overlayfs: unrecognized mount option "w" or missing value 03:38:11 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x18, 0xffffca88}}}}}, 0x0) [ 789.936864] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:11 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x3ba, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x2}, 0x0) 03:38:11 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 790.079635] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:11 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xffffffff00000000, 0xffffca88}}}}}, 0x0) 03:38:11 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xf4', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x6000000000000000}, 0x0) 03:38:11 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:11 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:11 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xe}, 0x0) 03:38:11 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x6000000000000000, 0xffffca88}}}}}, 0x0) 03:38:11 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 790.342754] overlayfs: unrecognized mount option "w" or missing value 03:38:12 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xa, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:12 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x600, 0xffffca88}}}}}, 0x0) 03:38:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xf0ffff}, 0x0) 03:38:12 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:12 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xc6', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xc00e}, 0x0) 03:38:12 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x608, 0xffffca88}}}}}, 0x0) [ 790.657861] overlayfs: unrecognized mount option "w" or missing value 03:38:12 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:12 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x1800000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:12 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xb00000000000000, 0xffffca88}}}}}, 0x0) 03:38:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xf000000}, 0x0) 03:38:12 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:12 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xd000000, 0xffffca88}}}}}, 0x0) 03:38:12 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x300}, 0x0) 03:38:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:12 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8100, 0xffffca88}}}}}, 0x0) 03:38:12 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 791.067570] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 791.103446] overlayfs: unrecognized mount option "w" or missing value 03:38:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x9effffff00000000}, 0x0) [ 791.196134] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:12 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x800e, 0xffffca88}}}}}, 0x0) 03:38:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:12 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:12 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:12 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x3f00000000000000}, 0x0) 03:38:12 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x03', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:12 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:12 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xffffeb22, 0xffffca88}}}}}, 0x0) 03:38:12 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xfb0a0000}, 0x0) 03:38:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:13 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8, 0xffffca88}}}}}, 0x0) [ 791.492161] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 791.518170] overlayfs: unrecognized mount option "w" or missing value 03:38:13 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x10000000}, 0x0) 03:38:13 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x1500000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:13 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x03', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:13 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x3f000000, 0xffffca88}}}}}, 0x0) 03:38:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xf0}, 0x0) 03:38:13 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a480700ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xfffffffffffff000}, 0x0) 03:38:13 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xffffbe88, 0xffffca88}}}}}, 0x0) 03:38:13 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 791.946228] overlayfs: unrecognized mount option "w" or missing value 03:38:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:13 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs>', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:13 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x18020000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xafb}, 0x0) 03:38:13 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x5865, 0xffffca88}}}}}, 0x0) 03:38:13 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x8000000}, 0x0) 03:38:13 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x300000000000000, 0xffffca88}}}}}, 0x0) 03:38:13 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:13 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 792.362554] overlayfs: unrecognized mount option "w" or missing value 03:38:13 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xa00}, 0x0) 03:38:13 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:13 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x806000000000000, 0xffffca88}}}}}, 0x0) 03:38:14 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x800000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:14 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 792.493031] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x6000}, 0x0) 03:38:14 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x65580000, 0xffffca88}}}}}, 0x0) [ 792.597382] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:14 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:14 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:14 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x883e0000, 0xffffca88}}}}}, 0x0) 03:38:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xf0ffffff}, 0x0) 03:38:14 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xb000000, 0xffffca88}}}}}, 0x0) [ 792.795295] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 792.827848] overlayfs: unrecognized mount option "w" or missing value [ 792.866343] kauditd_printk_skb: 14 callbacks suppressed [ 792.866358] audit: type=1804 audit(2000000294.396:321): pid=3239 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/414/file0" dev="sda1" ino=16582 res=1 03:38:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xffffff7f}, 0x0) [ 792.873210] audit: type=1804 audit(2000000294.405:322): pid=3239 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/414/file0" dev="sda1" ino=16582 res=1 [ 793.002651] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:14 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xc4000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xffffff9e}, 0x0) 03:38:14 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:14 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8847000000000000, 0xffffca88}}}}}, 0x0) [ 793.115810] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:14 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xfffffff0}, 0x0) 03:38:14 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:14 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xabfe, 0xffffca88}}}}}, 0x0) 03:38:14 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x300000000000000}, 0x0) 03:38:14 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 793.331581] overlayfs: unrecognized mount option "w" or missing value [ 793.352943] audit: type=1804 audit(2000000294.872:323): pid=3288 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/415/file0" dev="sda1" ino=17906 res=1 [ 793.386913] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:14 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xf6030000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:14 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x88a8ffff00000000, 0xffffca88}}}}}, 0x0) 03:38:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x400300}, 0x0) [ 793.436094] audit: type=1804 audit(2000000294.901:324): pid=3288 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/415/file0" dev="sda1" ino=17906 res=1 03:38:15 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000900ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 793.533708] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:15 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xff', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:15 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x60000000, 0xffffca88}}}}}, 0x0) 03:38:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x3}, 0x0) [ 793.601186] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 793.633244] overlayfs: unrecognized mount option "w" or missing value [ 793.677432] audit: type=1804 audit(2000000295.189:325): pid=3321 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/416/file0" dev="sda1" ino=17889 res=1 03:38:15 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a00070bab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x300000000000000) 03:38:15 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x3c0, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:15 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8906, 0xffffca88}}}}}, 0x0) 03:38:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xf0ffffffffffff}, 0x0) [ 793.779086] audit: type=1804 audit(2000000295.229:326): pid=3321 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/416/file0" dev="sda1" ino=17889 res=1 03:38:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x2000000}, 0x0) 03:38:15 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:15 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xba', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x200000000000000) 03:38:15 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8100000000000000, 0xffffca88}}}}}, 0x0) [ 794.016676] overlayfs: unrecognized mount option "w" or missing value [ 794.031413] net_ratelimit: 22 callbacks suppressed [ 794.031421] protocol 88fb is buggy, dev hsr_slave_0 [ 794.041487] protocol 88fb is buggy, dev hsr_slave_1 03:38:15 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 794.059374] audit: type=1804 audit(2000000295.576:327): pid=3348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/417/file0" dev="sda1" ino=16522 res=1 [ 794.102007] protocol 88fb is buggy, dev hsr_slave_0 [ 794.107291] protocol 88fb is buggy, dev hsr_slave_1 03:38:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x60000000}, 0x0) 03:38:15 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xf000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xffffff7f) [ 794.179946] audit: type=1804 audit(2000000295.605:328): pid=3348 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/417/file0" dev="sda1" ino=16522 res=1 [ 794.209998] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:15 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x894f0000, 0xffffca88}}}}}, 0x0) 03:38:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x3000000}, 0x0) 03:38:15 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:15 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs ', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x3f000000}, 0x0) 03:38:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x300) 03:38:15 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:16 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x300, 0xffffca88}}}}}, 0x0) 03:38:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x1000000}, 0x0) [ 794.490535] overlayfs: unrecognized mount option "w" or missing value 03:38:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x800000000000000) [ 794.519517] audit: type=1804 audit(2000000296.032:329): pid=3390 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/418/file0" dev="sda1" ino=16563 res=1 [ 794.563905] audit: type=1804 audit(2000000296.032:330): pid=3390 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/418/file0" dev="sda1" ino=16563 res=1 03:38:16 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xf0030000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xfb0a}, 0x0) [ 794.666680] protocol 88fb is buggy, dev hsr_slave_0 [ 794.671889] protocol 88fb is buggy, dev hsr_slave_1 03:38:16 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x7f', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xf0ffffff00000000) 03:38:16 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:16 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x14, 0xffffca88}}}}}, 0x0) 03:38:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x34000}, 0x0) 03:38:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x2}, 0x0) 03:38:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xf0ffffff) [ 794.886698] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:16 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x543, 0xffffca88}}}}}, 0x0) 03:38:16 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 794.958797] overlayfs: unrecognized mount option "w" or missing value 03:38:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xa}, 0x0) 03:38:16 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x1800, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x3f00) 03:38:16 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:16 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x3f00000000000000, 0xffffca88}}}}}, 0x0) 03:38:16 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xe000000}, 0x0) 03:38:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x400000000000000) 03:38:16 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x700000000000000, 0xffffca88}}}}}, 0x0) 03:38:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xf00}, 0x0) 03:38:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x9effffff00000000) [ 795.348067] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 795.354856] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:16 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:16 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x88640000, 0xffffca88}}}}}, 0x0) [ 795.397221] overlayfs: unrecognized mount option "w" or missing value [ 795.473392] protocol 88fb is buggy, dev hsr_slave_0 [ 795.473422] protocol 88fb is buggy, dev hsr_slave_0 [ 795.478498] protocol 88fb is buggy, dev hsr_slave_1 [ 795.483592] protocol 88fb is buggy, dev hsr_slave_1 03:38:17 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x9000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x4}, 0x0) [ 795.571097] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 795.580912] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:17 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x10', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x1000000000000000) 03:38:17 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xc00e000000000000}, 0x0) 03:38:17 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x80350000, 0xffffca88}}}}}, 0x0) 03:38:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xffffff7f00000000}, 0x0) [ 795.735746] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xf0ffffffffffff) 03:38:17 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xd00, 0xffffca88}}}}}, 0x0) 03:38:17 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x10}, 0x0) [ 795.902332] overlayfs: unrecognized mount option "w" or missing value 03:38:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x34000) 03:38:17 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:17 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x1100, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:17 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs`', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xec0}, 0x0) 03:38:17 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xffffca88, 0xffffca88}}}}}, 0x0) 03:38:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xf000000) 03:38:17 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xa00000000000000}, 0x0) 03:38:17 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x22ebffff00000000, 0xffffca88}}}}}, 0x0) [ 796.291395] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xfffffffffffff000) 03:38:17 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x02', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:17 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 796.337452] overlayfs: unrecognized mount option "w" or missing value 03:38:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xc00e0000}, 0x0) 03:38:17 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x100000000000000) 03:38:17 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x400000000000000, 0xffffca88}}}}}, 0x0) 03:38:17 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xb000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xf}, 0x0) 03:38:18 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000712ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:18 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:18 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x2000000, 0xffffca88}}}}}, 0x0) 03:38:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x40030000000000) 03:38:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xe00000000000000}, 0x0) 03:38:18 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000703ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 796.735718] overlayfs: unrecognized mount option "w" or missing value [ 796.763662] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xa000000) 03:38:18 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x700, 0xffffca88}}}}}, 0x0) 03:38:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x4000000}, 0x0) 03:38:18 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xf, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:18 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xec0) [ 796.926294] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:38:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xffffffff00000000}, 0x0) 03:38:18 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:18 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xaffe, 0xffffca88}}}}}, 0x0) 03:38:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x3f00000000000000) [ 797.030976] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 797.055840] overlayfs: unrecognized mount option "w" or missing value 03:38:18 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xfffff000}, 0x0) 03:38:18 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x288, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) [ 797.195336] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:18 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8848, 0xffffca88}}}}}, 0x0) 03:38:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x2000000) [ 797.297978] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:18 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:18 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x3f00}, 0x0) 03:38:18 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x10) 03:38:18 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:18 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xfffffffffffff000, 0xffffca88}}}}}, 0x0) [ 797.467370] overlayfs: unrecognized mount option "w" or missing value 03:38:19 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000702ab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x1c00000000000000) 03:38:19 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xf003000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:19 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x100000000000000, 0xffffca88}}}}}, 0x0) [ 797.589805] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x9effffff}, 0x0) 03:38:19 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 797.693149] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x1c000000) 03:38:19 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xf0ffffffffffff, 0xffffca88}}}}}, 0x0) 03:38:19 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xf000}, 0x0) [ 797.823531] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:19 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a00070fab092500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 797.908980] overlayfs: unrecognized mount option "w" or missing value [ 797.927176] kauditd_printk_skb: 13 callbacks suppressed [ 797.927191] audit: type=1804 audit(2000000299.414:344): pid=3662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/426/file0" dev="sda1" ino=16579 res=1 [ 798.002317] audit: type=1804 audit(2000000299.453:345): pid=3671 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/426/file0" dev="sda1" ino=16579 res=1 03:38:19 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x5000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:19 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x88caffff, 0xffffca88}}}}}, 0x0) 03:38:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xe00}, 0x0) 03:38:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xe000000) [ 798.166634] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:19 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:19 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x88470000, 0xffffca88}}}}}, 0x0) [ 798.273034] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xe) 03:38:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x60}, 0x0) 03:38:19 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfsL', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 798.365289] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 798.398434] overlayfs: unrecognized mount option "w" or missing value 03:38:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xffffff9e) [ 798.449030] audit: type=1804 audit(2000000299.929:346): pid=3696 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/427/file0" dev="sda1" ino=17891 res=1 03:38:20 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:20 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x22ebffff, 0xffffca88}}}}}, 0x0) 03:38:20 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x7000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xfb0a000000000000}, 0x0) 03:38:20 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8864000000000000, 0xffffca88}}}}}, 0x0) 03:38:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xffffffff00000000) 03:38:20 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x1000000000000000}, 0x0) [ 798.756612] overlayfs: unrecognized mount option "w" or missing value [ 798.772224] audit: type=1804 audit(2000000300.257:347): pid=3729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/428/file0" dev="sda1" ino=16566 res=1 03:38:20 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8060000, 0xffffca88}}}}}, 0x0) 03:38:20 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x15000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) [ 798.836480] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 798.894426] audit: type=1804 audit(2000000300.296:348): pid=3729 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/428/file0" dev="sda1" ino=16566 res=1 03:38:20 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x8f', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xffffff7f00000000) 03:38:20 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x40030000000000}, 0x0) 03:38:20 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8035, 0xffffca88}}}}}, 0x0) 03:38:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x6000) [ 799.159593] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x800000000000000}, 0x0) [ 799.222644] overlayfs: unrecognized mount option "w" or missing value 03:38:20 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x10000e0, 0xffffca88}}}}}, 0x0) 03:38:20 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab0c2500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 799.302306] audit: type=1804 audit(2000000300.772:349): pid=3757 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/429/file0" dev="sda1" ino=17963 res=1 03:38:20 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x1c) 03:38:20 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:20 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x1400000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xa000000}, 0x0) 03:38:21 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x6000000, 0xffffca88}}}}}, 0x0) [ 799.476599] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:21 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x3) 03:38:21 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x6000, 0xffffca88}}}}}, 0x0) [ 799.661032] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 799.672444] net_ratelimit: 19 callbacks suppressed [ 799.672452] protocol 88fb is buggy, dev hsr_slave_0 [ 799.672532] protocol 88fb is buggy, dev hsr_slave_1 [ 799.672640] protocol 88fb is buggy, dev hsr_slave_0 [ 799.672702] protocol 88fb is buggy, dev hsr_slave_1 [ 799.678257] protocol 88fb is buggy, dev hsr_slave_0 [ 799.703031] protocol 88fb is buggy, dev hsr_slave_1 03:38:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x8}, 0x0) [ 799.740656] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 799.784502] overlayfs: unrecognized mount option "w" or missing value 03:38:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x200000000000000}, 0x0) [ 799.822460] audit: type=1804 audit(2000000301.288:350): pid=3789 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/430/file0" dev="sda1" ino=16562 res=1 [ 799.861661] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:38:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xf00000000000000) 03:38:21 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x894f, 0xffffca88}}}}}, 0x0) 03:38:21 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 799.961886] audit: type=1804 audit(2000000301.318:351): pid=3789 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/430/file0" dev="sda1" ino=16562 res=1 03:38:21 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:21 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xa000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x100000000000000}, 0x0) [ 800.076666] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:21 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x4, 0xffffca88}}}}}, 0x0) 03:38:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x9effffff) 03:38:21 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xf0ffffff00000000}, 0x0) [ 800.260331] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 800.313533] protocol 88fb is buggy, dev hsr_slave_0 [ 800.318652] protocol 88fb is buggy, dev hsr_slave_1 [ 800.339849] overlayfs: unrecognized mount option "w" or missing value [ 800.354989] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:21 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xa00) [ 800.389407] audit: type=1804 audit(2000000301.853:352): pid=3817 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/431/file0" dev="sda1" ino=17890 res=1 [ 800.413340] protocol 88fb is buggy, dev hsr_slave_0 [ 800.413406] protocol 88fb is buggy, dev hsr_slave_1 03:38:21 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x8035000000000000, 0xffffca88}}}}}, 0x0) 03:38:21 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x400000000000000}, 0x0) 03:38:22 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:22 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x283, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) [ 800.509092] audit: type=1804 audit(2000000301.883:353): pid=3833 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/431/file0" dev="sda1" ino=17890 res=1 03:38:22 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0xf00000000000000}, 0x0) [ 800.709751] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x1c00) 03:38:22 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0xaffe0000, 0xffffca88}}}}}, 0x0) 03:38:22 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 800.829535] overlayfs: unrecognized mount option "w" or missing value [ 800.894105] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x6000000000000000}, 0x0) 03:38:22 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x88beffff, 0xffffca88}}}}}, 0x0) 03:38:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x4) 03:38:22 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x274, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) [ 800.978380] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 801.001620] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:22 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:22 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xf000000}, 0x0) 03:38:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x2) 03:38:22 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], 0x0) 03:38:22 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x9effffff}, 0x0) 03:38:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xe00000000000000) 03:38:22 executing program 3: syz_emit_ethernet(0x38, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa1908050010374162136e55f41c83e1303a0502fda588ec9bef0e8c08682371db6e30052e53a318451136fe6824ffae0c40144b613108f808486f646515ca8961db60c56350929d5956e140b03b"], 0x0) [ 801.289468] overlayfs: unrecognized mount option "w" or missing value [ 801.311418] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:22 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x4c01000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xfb0a}, 0x0) 03:38:22 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 801.444385] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x4000000) 03:38:23 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xfd', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:23 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 03:38:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xf00}, 0x0) 03:38:23 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x60000000) 03:38:23 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x20000) getresgid(&(0x7f0000000580), &(0x7f00000005c0)=0x0, &(0x7f0000000600)) syz_mount_image$ntfs(&(0x7f0000000100)='ntfs\x00', &(0x7f0000000140)='./file0\x00', 0x4, 0x6, &(0x7f00000004c0)=[{&(0x7f0000000a00)="74c54fa930135f2ae4f880bb734ddc83906ea684161ca825921b2ed25d68c351ded94ddf7ea84a2851e80677", 0x2c, 0x100000001}, {&(0x7f00000001c0)="2e492cfe25fad17823f92fa7db280a2d2ab17223722468a9e948131cc59b613ed4a21c26fd29282d3fe89ba758feeb011f5517a055ade659f733c893bf42a88dee2ea10d709dedd59a44e1bb3e7a8b696d8bf2731ce8871975259bf9a99ebb53df1d324075575500a3c4ba7cbdc6c11e6087ea07fe6818221e5d1e04f0b41f3bfad91686089f557c1bb84abfc05ee3ea7497b96bcff494918569315622846ac74bbf08360ddd394f2146dae44a3f0ea76745c6f67295e1d5cd011217de9795d84020c220ab61efc0", 0xc8}, {&(0x7f00000002c0)="74f8e9fafdf5a68422ea1f472ae38ee6518a05c5b3b6e399edc169c156104d9ea2ec5c8dfc4f2ed4b7bab8a887e4569cd32a1f8f9367105601fb49ccbad481a2503c15b1ae94d82f1cdc587805d377a9cb039c9626856f9562cfae0f5a3f7e1367c95d", 0x63, 0x4}, {&(0x7f0000000340)="7cd7926beefdc5de043c45bc736260573a6e2e73adbb41d2ba5381dfec3ebfb2d52dc7b56ce00deca15d3be5fc0b6ffad8a707910278aced627098ae3b7696bc0f7c713ce5ca6525eee3c58cfbeadd2fb9142fa6103ba9e6569b5300868514c1922f25c4f9b4fdf994cb9457", 0x6c, 0x1}, {&(0x7f00000003c0)="35a6b14b4d59c01a40a972b7c780d408fd7a440e315ef116849ebdd41d56a74b042bae88f985f6395a913ffc16f15322dac35b1e2029802cc05bc8553e3627902c1f5b8dfd055ab2738c87ca46844d8b3bccf35cabc96dd03756ed6890aa71a284dc", 0x62, 0x6}, {&(0x7f0000000900)="efd2a1e11e84bfc6e2bfec9184d65c91a1a82135e7d7d3b0fc1c519ad34b19f33e5593705b2738f9e48c5b6e0040733a46cab71014392516c60ab4a70250421bf7de77f6a2f7e840f7b425fa02e56d678efe37f4e01d5371c4fe034b8ce8305ec6c5e4cf441f8cc074084565a494d3d69c86c3fe05c40e01254bb676498abcd64f360c4e5b1489ef1d14be46c5f9ac60bb925777de63c40be3930000000041067ac4fd2fff68f56cf534fdf1a549fd291fc2c6029bc1b0924d3eac2a57b8d7627bedea15a6c07bd9cb8bb01b3861d876afd23433c00d82b59565e10ffe149486e1", 0xe1, 0x3}], 0x1000000, &(0x7f0000000800)={[{@gid={'gid', 0x3d, r1}}, {@show_sys_files_yes='show_sys_files=yes'}, {@errors_recover='errors=recover'}, {@utf8='utf8'}, {@disable_sparse_no='disable_sparse=no'}, {@errors_recover='errors=recover'}, {@case_sensitive_yes='case_sensitive=yes'}], [{@smackfshat={'smackfshat', 0x3d, '/dev/input/mouse#\x00'}}, {@dont_measure='dont_measure'}, {@smackfsdef={'smackfsdef', 0x3d, 'wlan0nodevuser'}}, {@appraise_type='appraise_type=imasig'}, {@obj_type={'obj_type', 0x3d, '&'}}]}) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000040)={0x0, 0x7b}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, 0x20, 0x8, 0xb96f, 0x1f, 0x0, 0x6, 0x2, r2}, 0x20) 03:38:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xf0}, 0x0) [ 801.781743] overlayfs: unrecognized mount option "w" or missing value 03:38:23 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab022500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:23 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x8802000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x8) 03:38:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xfffffff0}, 0x0) 03:38:23 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0xd6c, 0x80100) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r1}) 03:38:23 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x4}, 0x0) 03:38:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x6000000000000000) 03:38:23 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x423, 0x100) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@initdev}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000180)={@mcast2, 0x62, r1}) 03:38:23 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab0a2500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x800000000000000}, 0x0) 03:38:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xf0ffff) [ 802.280870] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 802.294256] overlayfs: unrecognized mount option "w" or missing value 03:38:23 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={r0, 0x50, &(0x7f0000000040)}, 0x10) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) 03:38:23 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x500000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x8000000}, 0x0) 03:38:23 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 802.436183] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xa) 03:38:24 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x400, 0x0) getsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_emit_ethernet(0xfffffffffffffed5, &(0x7f0000000080)=ANY=[@ANYBLOB="0000220000000180c200000f91003900810020008137ffff00000501fffffdffffffffffffff0dfa00000000ffffffffffff0005ba4531294df6b5f5a24ffd35ffb2b303b428010748770800000000000000f7a369f7aa0ca93666"], 0x0) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)=0x1, 0x4) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x4002, 0x0) 03:38:24 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:24 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab122500090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x3f00}, 0x0) 03:38:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xf0) 03:38:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x3}, 0x0) 03:38:24 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) syz_mount_image$ceph(&(0x7f0000000000)='ceph\x00', &(0x7f0000000040)='./file0\x00', 0x1, 0x1, &(0x7f0000000140)=[{&(0x7f0000000080)="404a186adfb6d4c9a2b9c513d833d5f11b90aaf946169f5f420f327ec19ea25a0a2aa68a45b468bd6a25a7314203a185f3a6d87906fced4fef6d9c4108aba0801e2818c11ed9a5c873de4c6c87ea3eb18360ee424436ee5cf8da4158c647bfbb88023ac1765c1cd166fe6b4d820eab1746b335c06f89706e424ac529b7311dad97542b7274438ebdc63c51fc1e89772bb7e7a3ff1689aa8a0dec2fd1d6fc595077b84f54a3ed715ebc2ee31f4c7494018a2ff9b2e5f1e74a", 0xb8, 0x1}], 0xa, &(0x7f0000000180)='\x00') 03:38:24 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab096000090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 802.790571] overlayfs: unrecognized mount option "w" or missing value [ 802.803229] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 802.886961] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 802.920567] __nla_parse: 8 callbacks suppressed [ 802.920576] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:24 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x7402000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xf00) 03:38:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xa000000}, 0x0) [ 802.953334] ceph: device name is missing path (no : separator in /dev/loop3) 03:38:24 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:24 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xf0ffffff}, 0x0) 03:38:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xfffffff0) 03:38:24 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000040)) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) getsockopt$inet6_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000080)=""/4096, &(0x7f0000001080)=0x1000) 03:38:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xc00e}, 0x0) [ 803.128898] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:24 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 803.219947] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x1000000) 03:38:24 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffffffffffffffff08004500fec30000000000309078ac14ffbbe000000100000000ca889078"], 0x0) [ 803.307870] overlayfs: unrecognized mount option "w" or missing value [ 803.332031] kauditd_printk_skb: 12 callbacks suppressed [ 803.332046] audit: type=1804 audit(2000000304.769:364): pid=4040 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/437/file0" dev="sda1" ino=16865 res=1 [ 803.342315] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 803.424500] audit: type=1804 audit(2000000304.818:365): pid=4047 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/437/file0" dev="sda1" ino=16865 res=1 03:38:24 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xb4020000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x40030000000000}, 0x0) 03:38:24 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xc00e0000) 03:38:24 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00', 0xffffffffffffffff}, 0x30) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 03:38:24 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:24 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x02', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 803.571175] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:25 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x208402, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000040)=0x6) msgget$private(0x0, 0x100) ioctl$TIOCGETD(r0, 0x5424, &(0x7f00000000c0)) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') 03:38:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x1000000}, 0x0) 03:38:25 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xf000) [ 803.703353] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xe00}, 0x0) 03:38:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.stat\x00', 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000080)={@host}) syz_emit_ethernet(0x32, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaeaaa000000003a5691003b0081004f0008004500001c00000000002f0078ac14ffbbe00000010000000000089078"], 0x0) [ 803.865692] overlayfs: unrecognized mount option "w" or missing value [ 803.904117] audit: type=1804 audit(2000000305.344:366): pid=4078 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/438/file0" dev="sda1" ino=16913 res=1 [ 803.951315] audit: type=1804 audit(2000000305.364:367): pid=4078 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/438/file0" dev="sda1" ino=16913 res=1 03:38:25 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x5400, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xe00) 03:38:25 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:25 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092508090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xfb0a0000}, 0x0) 03:38:25 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000000)={@broadcast=[0xff, 0xe0], @remote, [{[{0x9100, 0x1d2, 0x10000, 0x4}], {0x8100, 0x1, 0x0, 0x4}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) [ 804.088918] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xfb0a000000000000}, 0x0) 03:38:25 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x40880, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000140)={0x3, [0x2, 0x1, 0x34]}, 0xa) readv(r0, &(0x7f0000002180)=[{&(0x7f0000000180)=""/4096, 0x1000}, {&(0x7f0000001180)=""/4096, 0x1000}], 0x2) syz_emit_ethernet(0xd9, &(0x7f0000000000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@generic={0x8035, "6e9159bd388f274e0f79d134308298edb902bbde29198d8c8f12bcf4f4bf20f2b98cc348cc47161d7a6b6a5c4b09e06e1965773a17284a7f8a4988aba37d877c0a8565fa32634aba58dca44c641938cbc2b237ab5d064d0e5b1feb801bebce1cb667d17188d2d582aa6ab781a59a90aa76ae3e84ea2749f134da8feefb844d66a72a9ca9822e41b3720c17c0783ac1080274c791370e8fee57ad79becb512199ec3a7dcfa03ed9b4972e2efd6a984325a66f28fe7c73128d2dfd73c57edc7ba06b152f85dcdec7ec0e1f00"}}}, 0x0) 03:38:25 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xc00e) [ 804.164459] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x60000000}, 0x0) [ 804.320495] overlayfs: unrecognized mount option "w" or missing value [ 804.332055] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:25 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xc4', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 804.360849] audit: type=1804 audit(2000000305.790:368): pid=4105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/439/file0" dev="sda1" ino=16641 res=1 [ 804.414856] audit: type=1804 audit(2000000305.820:369): pid=4105 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/439/file0" dev="sda1" ino=16641 res=1 03:38:25 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x1a4, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:25 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffffffffffffffff08004500fec300000000002f9078ac14ffbbe00001000000000000b8fc78"], 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x80000007e2f, 0xfffd) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000040)={'filter\x00', 0x4}, 0x68) 03:38:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x60) 03:38:25 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x6000}, 0x0) 03:38:25 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092505090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xa00}, 0x0) 03:38:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x400300) [ 804.554362] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:26 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) write$P9_RWRITE(r0, &(0x7f00000000c0)={0xb, 0x77, 0x2, 0x6}, 0xb) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) ioctl$VT_SETMODE(r1, 0x5602, &(0x7f0000000040)={0x4, 0x4, 0x0, 0xffffffff}) 03:38:26 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:26 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 804.673625] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x10000000) 03:38:26 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 804.748172] overlayfs: unrecognized mount option "w" or missing value [ 804.774761] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 804.812971] audit: type=1804 audit(2000000306.246:370): pid=4157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/440/file0" dev="sda1" ino=16865 res=1 03:38:26 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x218, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:26 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000000)=ANY=[], 0x0) 03:38:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xa00000000000000}, 0x0) 03:38:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x3000000) [ 804.867849] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 804.886707] audit: type=1804 audit(2000000306.246:371): pid=4157 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/440/file0" dev="sda1" ino=16865 res=1 03:38:26 executing program 3: syz_emit_ethernet(0x6, &(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESOCT, @ANYRESOCT, @ANYRES16, @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYRES64, @ANYBLOB="638375de34f3280fe637601237e043dc56eb02529ea1d2615ef8a7529e79d9b05ca50548ad4557fecc22197a5d01fa767b1de526225444d2ca59f2e355b3d654250a56d96b20bbddd64df9ded6927e6934fe8360e6a5807b719449292bc3ec36484e0dfadde9e4f0c7a76f57847b424a5839ba9fcd1b401b629086f94464f06882208b189a8f3e283f", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRES32, @ANYRES64, @ANYPTR64]], @ANYPTR64=&(0x7f0000000040)=ANY=[@ANYRESHEX, @ANYRESHEX]], 0x0) r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x3ff, 0x0) r1 = getpid() r2 = inotify_add_watch(r0, &(0x7f00000005c0)='./file0\x00', 0x78) inotify_rm_watch(r0, r2) setsockopt$inet_int(r0, 0x0, 0x2a, &(0x7f0000000380)=0xffffffffffff28c4, 0x4) sched_setattr(r1, &(0x7f00000000c0)={0x30, 0x130f785242b75ad3, 0x1, 0x1, 0x2, 0x2, 0x100000000, 0x80000001}, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000440)={{0xa, 0x4e22, 0x72, @mcast1, 0x4}, {0xa, 0x4e22, 0x447c, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3ff}, 0x9, [0x10001, 0x89, 0xffff, 0x9, 0x9e57, 0x9, 0x3, 0x8]}, 0x5c) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000600)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}}}, &(0x7f00000006c0)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000700)={r3, 0xb26}, &(0x7f0000000740)=0x8) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000340)={0x3, 0x7, [{0x200, 0x0, 0xffffffffffffffff}, {0x9, 0x0, 0xc5fb}, {0x5, 0x0, 0x516}]}) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f0000000080)={0xf000, 0x100000, 0x0, 0x800, 0x8}) shmget$private(0x0, 0x4000, 0xa, &(0x7f0000ff9000/0x4000)=nil) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000100)={@empty, @broadcast, 0x0}, &(0x7f00000002c0)=0xc) connect$packet(r0, &(0x7f0000000300)={0x11, 0x1, r4, 0x1, 0x4, 0x6, @random="5755ebcc3118"}, 0x14) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000780)={0x0, 'irlan0\x00'}, 0x18) getsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f00000003c0), &(0x7f0000000400)=0x4) [ 804.942106] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:26 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xf0ffffffffffff}, 0x0) 03:38:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xc00e000000000000) 03:38:26 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x80', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:26 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xa00000000000000) 03:38:26 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x8000) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000040)={0xd121, 0x8, 0x40, 0x9, 0xfffffffffe753c20, 0x7}) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) [ 805.153767] net_ratelimit: 22 callbacks suppressed [ 805.153788] protocol 88fb is buggy, dev hsr_slave_0 [ 805.164100] protocol 88fb is buggy, dev hsr_slave_1 [ 805.191083] overlayfs: unrecognized mount option "w" or missing value [ 805.206711] audit: type=1804 audit(2000000306.633:372): pid=4174 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/441/file0" dev="sda1" ino=16533 res=1 [ 805.262247] audit: type=1804 audit(2000000306.663:373): pid=4187 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/441/file0" dev="sda1" ino=16533 res=1 03:38:26 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x5001000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xe00000000000000}, 0x0) 03:38:26 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:26 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xfffff000) 03:38:26 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = add_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="1e52b908656a95e3", 0x8, 0xfffffffffffffff9) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$reject(0x13, r0, 0x1, 0x100000000, r1) 03:38:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xffffffff00000000}, 0x0) 03:38:26 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:26 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x400000000000000}, 0x0) 03:38:26 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab0925000c0007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x8000000) [ 805.526274] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:27 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffffffffffffffff080000002f9078ac14ffbbe000000100000000ca88907800000000000000"], 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xdaa, 0x400) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000010c0)={0x0, @empty, @multicast2}, &(0x7f0000001100)=0xc) recvfrom$packet(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x40000040, &(0x7f0000001140)={0x11, 0x6, r1, 0x1, 0xb440}, 0x14) [ 805.653228] overlayfs: unrecognized mount option "w" or missing value [ 805.669896] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:38:27 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xf803000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x3000000}, 0x0) 03:38:27 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:27 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffffffffffffffff08004500fec3000000bbe000030100000000ca8808000000000000000000"], 0x0) r0 = open(&(0x7f0000000080)='./bus\x00', 0x80000141042, 0x0) close(r0) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x9) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x410080, 0x0) 03:38:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x3f000000) 03:38:27 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0xf) 03:38:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x10}, 0x0) 03:38:27 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:27 executing program 3: syz_emit_ethernet(0xffffffffffffff68, &(0x7f0000000000)={@broadcast=[0xff, 0xe0], @broadcast, [{[], {0x8100, 0x8001, 0x80000000, 0x1}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) [ 805.941456] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 805.960542] protocol 88fb is buggy, dev hsr_slave_0 [ 805.965694] protocol 88fb is buggy, dev hsr_slave_1 [ 805.970490] protocol 88fb is buggy, dev hsr_slave_0 [ 805.970871] protocol 88fb is buggy, dev hsr_slave_0 [ 805.975791] protocol 88fb is buggy, dev hsr_slave_1 [ 805.980865] protocol 88fb is buggy, dev hsr_slave_1 03:38:27 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092513090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xf0ffff}, 0x0) [ 806.103054] overlayfs: unrecognized mount option "w" or missing value [ 806.115005] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:27 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x96020000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e00d40900000000000000000e000000"], 0x14}}, 0x0) 03:38:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xe000000}, 0x0) 03:38:27 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0xf8, &(0x7f0000000080)=0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x200401) close(r0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0xc000, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000100)={0x0, 0xea59}) openat$vhci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhci\x00', 0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffff760effffffff08004500fec300000000002f9078ac14ffbbe000000100000000ca889078"], 0x0) 03:38:27 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab0925000a0007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:27 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x06', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x300000000000000}, 0x0) 03:38:27 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x2, 0x2) accept4$ax25(r1, &(0x7f0000000140)={{0x3, @rose}, [@rose, @rose, @default, @default, @rose, @bcast, @netrom, @netrom]}, &(0x7f00000000c0)=0x48, 0x80000) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:27 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:27 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ff20c356fc2290c42f9078ac14ffbbe000000100000000ca889078"], 0x0) 03:38:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x60}, 0x0) 03:38:27 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 806.480858] overlayfs: unrecognized mount option "w" or missing value 03:38:28 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x3c00, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000080)={0x1, 0x0, {0x4, 0x20000, 0xffffffff, 0x101}}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x80000000, 0x5}) 03:38:28 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffff22ffffff4965ffff08004500fec300000000002f9078ac14ffbbe000000100000000ca889078"], 0x0) 03:38:28 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x100000000000000}, 0x0) 03:38:28 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092506090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 806.605760] protocol 88fb is buggy, dev hsr_slave_0 [ 806.610886] protocol 88fb is buggy, dev hsr_slave_1 03:38:28 executing program 4: r0 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0x96, 0x800) getsockopt$inet6_dccp_buf(r0, 0x21, 0xc, &(0x7f0000000140)=""/4096, &(0x7f0000001140)=0x1000) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x8000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000011c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r1, &(0x7f0000001280)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x40000010}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x24, r2, 0x820, 0x80000000, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x7fff}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x810) 03:38:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x10000000}, 0x0) 03:38:28 executing program 3: syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x9, 0x400000) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) recvfrom$rxrpc(r0, &(0x7f0000000080)=""/81, 0x51, 0x0, &(0x7f0000000100)=@in6={0x21, 0x4, 0x2, 0x1c, {0xa, 0x4e22, 0x4, @remote, 0x6}}, 0x24) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000040)={0x7, 0x103, 0x1, {0x9, 0x6, 0x8, 0xfffffffffffffffc}}) 03:38:28 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 806.801966] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xffffff9e}, 0x0) 03:38:28 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 806.924111] overlayfs: unrecognized mount option "w" or missing value 03:38:28 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x1010000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:28 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000040)=0x20, 0x372) syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0fffffc072445d41d543e1bffffffffffffffff080056caa3fadc47c5b4742baa41d3d88a7b000000"], 0x0) 03:38:28 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x30, r1, 0x300, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x5, 0xb1a5, 0x10000, 0x4}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x5}, 0x4000000) 03:38:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xafb}, 0x0) 03:38:28 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092510090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x200000000000000}, 0x0) 03:38:28 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:28 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101800, 0x0) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f0000000040)={[0x1ff, 0x1, 0x9, 0x4, 0x5, 0x16e, 0xffffffffffff0000, 0x0, 0xff45, 0x800, 0x6, 0x9, 0x5, 0xeb9f, 0x96, 0x8000], 0x106000, 0x20000}) 03:38:28 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000140)={0x7fffffff, 0x80000001, 0x1000, 0x99e, [], [], [], 0x10001, 0x4, 0x6, 0x6, "712e01c2aa038ebfafa3e06a347acd5b"}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) [ 807.181874] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x3f000000}, 0x0) 03:38:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000080)={0x0, 0x2, 0x7, 0x9}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000740)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000700)={&(0x7f0000000340)={0x3a4, r1, 0x30, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bridge0\x00'}}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}]}, @TIPC_NLA_LINK={0x18, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0xd4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x323}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdda}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd46db78}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5ab6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}]}, @TIPC_NLA_LINK={0xc8, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x67c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x53}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffff9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf223}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6cd}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffd}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7a}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x3a4}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0xcc, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100000001}]}, @TIPC_NLA_NET={0x3c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xffffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffffe}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xdcd}]}, @TIPC_NLA_LINK={0x10, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4308}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x10}, 0x40000) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) [ 807.301642] overlayfs: unrecognized mount option "w" or missing value 03:38:28 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xe4010000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:28 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:28 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:28 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffffffff08004500fec3007f0018002f9078ac14ffbbe000000100000000ca889078"], 0x0) 03:38:28 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x4000000}, 0x0) 03:38:28 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:28 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x4, 0x501000) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000140)={0x0, 0x6c8b5eb, 0x5af43804, [], &(0x7f00000000c0)=0x7d5}) 03:38:28 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x40, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x40000000000, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x101000, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f00000000c0), r1, r2}}, 0x18) r3 = syz_open_dev$amidi(&(0x7f0000000540)='/dev/amidi#\x00', 0x547, 0x200000) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000200)=""/139) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000000)={0x7f, 0x0, 0x0, 0x10000000003}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000300)={0x0, r4, 0x1, 0x1}) ioctl$BLKIOOPT(r3, 0x1279, &(0x7f0000000040)) sendmsg$key(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)={0x2, 0x12, 0xfffffffffffffeff, 0x9, 0x25, 0x0, 0x70bd25, 0x25dfdbff, [@sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in=@local, 0x1f, 0x10, 0x10}, @sadb_key={0x19, 0x8, 0x5e0, 0x0, "23ec110f00098515f8c76f2a4a75d00f1010d72849be4e0c452c776eefb875ba88959693a4113a65439e7b85941790635b3fbcbf9f38bc37b8fe4bdb2b917fd34c7db38ded1471a572f1ae101fc8c36b1fa57a4507917fbb13eb46ce430cdeb12c73746e5428d184c1c563a05894995a9c854321f36ef6218f6f4be59070fb605d1035ac6fe529b8c845f3a7e2f84795d4fbb472918524a452c6405837104618a96cbd627809ebdd9fc8c585ae4ea3d8e9c41e688f94dfb66023502f"}, @sadb_address={0x3, 0x7, 0x3f, 0x80, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}, @sadb_x_sa2={0x2, 0x13, 0x7, 0x0, 0x0, 0x70bd25, 0x3501}]}, 0x128}}, 0x10) [ 807.494476] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:29 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xe}, 0x0) [ 807.622049] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:29 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) inotify_init1(0x7fffe) 03:38:29 executing program 3: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1000, 0xffffffffffffffff) syz_emit_ethernet(0xffb6, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffe0ffffffffffffffffffff0875c1d9ea90b59700a23d4500fec3000000005193757a4755f240d91d58c5c9002f9078ac14ffbbe000000110000000ca8890786aa2ccaee9f3c0ecef347dbc8a997009b64ff02d96194be7bf936d6489f0f30b969617ff3d10e07933a80f505910264526b5415d8204a1b918c2a18ea7a4e56a98be1560cca48cc38437b7ecea576d7a1cdb81890e80c9739d2ce1f2af5bb76482e37ccb2fb30def36e277ea2381bac905c8f1b34324b8d80932b7cdd7ee0bc2d6754d88c7a21ad317fd3fe827e296fc50d3f4462a6bf27282a6ff3eaf33315ae94c591b1d8e711cc393a55ea9068bbd145b9faa87191dcd610ef467a01c00ea317bf4c49fca28e31a3b721968f9afe4d900447dc60faf68d0267a3ba266295bf897bbb7bbd7fc"], 0x0) [ 807.671041] overlayfs: unrecognized mount option "w" or missing value 03:38:29 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x50010000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:29 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:29 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x3f00000000000000}, 0x0) 03:38:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000140)={0x2, 0x3, 0x7}) ioctl$VIDIOC_ENUM_FRAMESIZES(r1, 0xc02c564a, &(0x7f00000000c0)={0x5, 0x34524742, 0x3, @stepwise={0x1, 0x20, 0x800, 0x81, 0x1d79, 0x1}}) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e00010300143f497a1b"], 0x14}}, 0x0) 03:38:29 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f0000000000)=ANY=[@ANYBLOB="ffe0ffffffff59cdc28f3b9687114500f6c300000000002f9078ac28139575d51b2409b8495f555014ff19b799d7134bb2dc60de6670ea7d5359a6a3a0ddd891d49a987d07eae99c7dc4c59ae3bc662284d1fc35a0a25b30cc7926302963a732fea205427bce6b8445f65c550878df99e531ec4275d14e130f32251c39de851803f57360d14046f5d51a90adb8fb672539c659a48d2330804723db19fb5a61e82826007a4cb491a87f338d7da76b7c265072e265d844210c1e911b"], 0x0) 03:38:29 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 807.834339] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xc00e000000000000}, 0x0) 03:38:29 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x2, 0xa0000) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000040)=0x4) 03:38:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x4000, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f00000000c0)={0x3d, 0x200}) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x17, 0x9, 0xe1c, 0xbcf60d3, 0x4, r1, 0x100000001}, 0x2c) 03:38:29 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xc00e0000}, 0x0) [ 807.994518] overlayfs: unrecognized mount option "w" or missing value 03:38:29 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x8302, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xf}, 0x0) [ 808.083250] __nla_parse: 21 callbacks suppressed [ 808.083261] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:29 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xff', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:29 executing program 4: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x10) accept$alg(r0, 0x0, 0x0) 03:38:29 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ff00002f9078ac14ffbbe00000010000000cca88907800000000000000000000000000"], 0x0) 03:38:29 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:29 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x80, 0x404040) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f00000000c0)={0x0, 0x2, 0x1, 0x2}, &(0x7f0000000140)=0x10) syz_read_part_table(0x1, 0x3, &(0x7f0000000480)=[{&(0x7f0000000280)="e8122c90001e8ea1e7c5b92a4e1ad624c0aa123cfb332b57d5eacc7bf39c09ac026d8226020d201cda5642887cebc6fa9c5dfdd8575bce681adaea6db229e70c7b6b4ca9f903328fa22145607353c04c55aef5c7cbb88da4", 0x58, 0x8000}, {&(0x7f0000000300)="697f383d48a930847ead464159e01683fdc7246686905a4110b6b1370a7f361978ca736f8d7bd26d8aabee514ee862d7214bc3cb162564c0f88d5a1b38e6e7566ed0d976cdfa92de3ab550953e0c354b8100c1c46778a60cf3eb815fbc1117fbb59da2da6bcd2b9e0bfb973fb83b1c6acd97a9fbd2be7446268d82512fdd830e2e7a70f08756e1ba13c8e7543d99ee35f95f300b76a054c72347c5e42fbffb4304b8dab6c64fb8bda4e36329237ea3d3047f1cf98b16c067757407f223962b5211b6521968bf1c9d134046b0f8924329bb970991710a3932c53b665225b1d49ba04775440f7a8a6d16e423fd9829038b3f782a89cabd6d8351", 0xf9, 0x1}, {&(0x7f0000000400)="3cbc9ad512474562b38841293332ff23316488cd553d07d9d7e99da932d248520bc443aadd6c494b18c264535624a34bdce95ab89b861d675f83b538e18bbda06929f8550044899197b7cfbf6baeb7f39704e062d97aee0379d7720cf5", 0x5d, 0x5}]) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000180)={r1, 0x80000001}, 0x8) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000040)='\x00', &(0x7f0000000200)='trusted.overlay.nlink\x00', &(0x7f0000000240)={'L+', 0x6}, 0x28, 0x3) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000002e00010300000000000000000e000000b8e04fabd7c7e974c1dfa0c967e907e2b32b5ec823b7f5d91976b414"], 0x14}}, 0x0) 03:38:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xa}, 0x0) [ 808.241872] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:29 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) syz_emit_ethernet(0xffb6, &(0x7f00000067c0)=ANY=[@ANYBLOB="ffc5ffffffffffffffffffff08004500fec300000000002f9078ac14ffbbe000000100000000ca8890780136189211d7833f748ff8f2f9215e69b28ce2e67709e8"], 0x0) r1 = getpgrp(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000002240)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f0000002340)=0xe8) getresgid(&(0x7f0000002380)=0x0, &(0x7f00000023c0), &(0x7f0000002400)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000002a40)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002a80)={0x0, 0x0}, &(0x7f0000002ac0)=0xc) r6 = getegid() r7 = getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002b00)={0x0, 0x0}, &(0x7f0000002b40)=0xc) stat(&(0x7f0000002b80)='./file0\x00', &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000002c40)={0x0, 0x0}) stat(&(0x7f0000002c80)='./file0\x00', &(0x7f0000002cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000002d40)=[0x0, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xee00, 0xee00, 0xee00, 0xee01, 0xee01]) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000002d80)=0x0) lstat(&(0x7f0000002dc0)='./file0\x00', &(0x7f0000002e00)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000002e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000003480)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000034c0)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f00000035c0)=0xe8) getgroups(0xa, &(0x7f0000003600)=[0xffffffffffffffff, 0xee00, 0xee00, 0xee01, 0xffffffffffffffff, 0xee01, 0xee01, 0xee00, 0xffffffffffffffff, 0xee01]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000003640)=0x0) getresuid(&(0x7f0000003680), &(0x7f00000036c0)=0x0, &(0x7f0000003700)) r21 = getegid() r22 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004a00)={{{@in, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6}}, &(0x7f0000006780)=0xe8) getgroups(0x7, &(0x7f0000004b40)=[0xee00, 0x0, 0xee01, 0x0, 0x0, 0xee01, 0xee01]) r25 = getpgrp(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004b80)={{{@in=@multicast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000004c80)=0xe8) fstat(r0, &(0x7f0000004cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000004d40)={0x0, 0x0}) r29 = getuid() lstat(&(0x7f0000004d80)='./file0\x00', &(0x7f0000004dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r31 = gettid() stat(&(0x7f0000006540)='./file0\x00', &(0x7f0000006580)={0x0, 0x0, 0x0, 0x0, 0x0}) r33 = getegid() sendmmsg$unix(r0, &(0x7f0000006640)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002200)=[{&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="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", 0x1000}, {&(0x7f00000020c0)="d9fae56bf585943c5e5c8ecd819ca5e3422fd825eb0c77f2dad382312fffd6c4dcf6186a19e0153f73bacd5f697f3382fcc41e4623d7898ecc53f9ad67054ae32b5457438d", 0x45}, {&(0x7f0000002140)="d41d5cd5159e10163202a019a8c7d04f2c35d589d3bfd48be33a6dd4f5afd0c48ec17fea783ff77189d388a5299ea9033c8d628a9c63455414b5e31ea5d22abbafbf383b7d0a05676553106a0b083eacc838b27048bcdfc7513dc9455e4fcc77e3f5aefa26a3379f29000ff762aadf52431b01697d45887c83228f8d29e0ddb86d64dea76bcc8d59c1acbb7df276b35277ee2a91c15aa6aea17f09f225a132f815957bd335136e0d5a781b", 0xab}], 0x4, &(0x7f0000002440)=[@rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r1, r2, r3}], 0x50, 0x8000}, {&(0x7f00000024c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f00000029c0)=[{&(0x7f0000002540)="635a8b1aae6d8e76fdd5de44", 0xc}, {&(0x7f0000002580)="5d2d5ccb2c52228f0294d5adb33de69eba5da842322529220e650921023c80cddb2ed2707936b539f9ddace2a9461c1239b134bea0e459fabf96fd00b81c1c9a3da24a2e7a1243855b14b37d631fe3b66d6d55966cc7504914edde759114d070f2cdacb571f402accffdab87539dbba4c71491e2d38de4f3a3be698adf46", 0x7e}, {&(0x7f0000002600)="888f289d4e1aa5e764b591575048b5e77639716e4e94d51512c0bb48ae2d62dbf744ead00721f28510d593d78e5281ae56d470627d35698727ae5ab74bcf5206cd4a791511a9a4c0c4624bac34873f461c0c87afcf4fc7af5ef9a073fe6a065edb6b1bb003f216eb314b0589120a1be12ac1cec1c805ee387cf52d2cd3555a59b6a0b4ed40f05ebf23b9fd9732247b21500f8111064d07fbf81969e91299756b3cf94d25745501", 0xa7}, {&(0x7f00000026c0)="8113dd0f03ff0a2ea835552ccda313bdc1211c00ea72a33067409ca87841e36e878f84701648a5a79412a6679bc8e9133c28383c3f8b820b65ac9fc9f162bdb5aec4bd4aa5f9c58c8140552f7080c5ac7c4ce25e3b8e405389535d606c99cc5c128e1cd31c6543ecd57cb104fec38d36e04c", 0x72}, {&(0x7f0000002740)="f165813ed8d3a2a43f211bff6710e7dfd223b323b12145ea38e35fa10aba84007bd5f90b0f8c7d4561e9d18eadfa67d1bc8312d3f598333932eaa440031a9965e6b1e899e1707c0a45a1d5adf3ebec94981f3611ca5182fb0910d37efe9ea785ee163d2fdc1b4121497ddd73ef18e88c5657e9ba58f270f93053d195b24bad61", 0x80}, {&(0x7f00000027c0)="3eb76f75a792cd681c326a725c98bea5092333b6b83e2119078dd41b8dc90e96b8006220a9cf1504de7918400c4dcc2e4a16ae2a1f7516c2b3fe5303ce44a471d4e63436692f9d97c67a0fd6f69d33c53d8bd6c1d8566cdeb7eb458b26d4cc3606b7f68e284d2da756c268f498ecc2fef36dad581f0396cd142fabb711bfaf7266e8c0375f13770a99ff2fbd7ded47fcee05291db7921e96ac143781daac7fd92518b4cd14e8e36bb33fc65f4b150db8cc98f480", 0xb4}, {&(0x7f0000002880)="74b1d468d40f5a4cacaf22103e1a9de77bfb904bd080db202257e87546911d065c1d5c204dc88bdd0a0619eb44080bdfa4aa0c501f56dbc387a0ac1284c849f8d894bfbe6bef59a1d1fecb029731bd929e7ec9398af37d9de3640e063724068b6edb1a9c71d13804d9550c154aa2ea8926a21997f0fdb88bdd578106505826c54330b1cf739ac3ed801c8b070ce9432f1459e522cf241f532682db343c3161480780d9148441329781eab2e1d809d2c8edf295fa488a3003756c5ce4c4323c0aeec972c252663b1d2a3f", 0xca}, {&(0x7f0000002980)="9903711d5c99a0c2ffb66643840d4f5bff4826b433d23b6f4800f8ada98dcf1a807447cd5a", 0x25}], 0x8, &(0x7f0000002f00)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r13, r14, r15}], 0x110, 0x4}, {&(0x7f0000003040)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003400)=[{&(0x7f00000030c0)="eb4b701dffd8a0a51e689a162aeccf7ac7b0881299c6bb75ce7d8e944740e868e2b3cf9f336a6840edba359bb0c5251bb09c6e06a4273b2ab9", 0x39}, {&(0x7f0000003100)="9de0ed2e42a8320d7cc536387f4ea771ec53ffb8a0f585b147d63fb8100a70717b81eb22208a36eeb0895c03b9821964b0ba740caf85b944e8c5ac0ae998852379b26ec7f8c01eb808e24b64254842aca449e519fbb01dac9fc5651970f572bf60571ec075c4dc66a8e4a1688bad4b5ab027cc5bee6335e9741f1c97d7d519d9b1965e63ed68e37b91c7", 0x8a}, {&(0x7f00000031c0)="1c1c2e8223f8958213d0bce7fb752e90ec961d33566814756018f8a29b9667cbf78b7192ae98f7f1b489b46bc2ab73dca62cbecfdb928e002f", 0x39}, {&(0x7f0000003200)="6338a0e42975e25a6da57fd65d1ca821d92eacbb690a849f518fe911b7ad409d761e3d7c1fd5b4598a719a37554d928db486f347faa478cbc41f0a3e7fc18e5acaa9165ef5741bd3a460c642c6ea65a4feb0e81a57587a39d94594b2e880b5b4bd429c9dd43cac7c6a4a5ee472f1710bdbc8ec19df1b1cd6cd170eac72846faa2c4ab9594598ce4a2de5400267091eb1b58bd93340c8b7f372a44f79d82bbde5a0e0e06094444c54c00fb45e76b267cf3ef0cb61ecc638ba8d2b9a03739d883096487ebde7d6c1ae795f6104b929c9d8efc2e9a953a2cf6788e627d88234bcfbe8b79d8c66698288b405cda5c6fc44ce7132c29223dd3e8c1934271e81dc", 0xfe}, {&(0x7f0000003300)="8a4272186f4720a27d2af19fa02a6834280e2af6a63bbd93cf6c8707680d16367ed53bcdbdbd42a676d0aa2e96c136582f9100a4b9abb892bdba34921f3f3f358e95ee4837e18d908bc49dc2df4162eca79c673ac374e539de4c12b3e4ea3d45a4ce51b46d826609540d453afa197c703311192b6984ec65d22c11b31224dc731cb6a64f7acbe2fbe9c7aa1b792897e65603fd12d035ae375c27e8357485e4e7ee0a28dbb1b50af22a4445fe8973942558f0ebd006bfcd3fe22f3e946463f02b42a94d7a5176f32f9ada1fbdb7864edca03217430a50731c405722237232ab24", 0xe0}], 0x5, &(0x7f0000003740)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @cred={0x20, 0x1, 0x2, r19, r20, r21}], 0x60, 0x80}, {&(0x7f00000037c0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004980)=[{&(0x7f0000003840)="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", 0x1000}, {&(0x7f0000004840)="49216a7bedfb86", 0x7}, {&(0x7f0000004880)="c297330493cc", 0x6}, {&(0x7f00000048c0)="444e82d24a0efc070c3a388b73aeea31d41d0adac162cdf06e462ad5c91395f649e5e72ee1734b9b54f3d45f1aed335e9c7302f930373d16d30497e29555103be8dc8c2dc1b46e2ddb01e931f5db177a721e6617", 0x54}, {&(0x7f0000004940)="3acea60e4d34d2cb36cbad894906528a", 0x10}], 0x5, &(0x7f0000004e40)=[@cred={0x20, 0x1, 0x2, r22, r23, r24}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r25, r26, r27}, @cred={0x20, 0x1, 0x2, r28, r29, r30}], 0x88, 0x4000000}, {&(0x7f0000004f00)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000006480)=[{&(0x7f0000004f80)="96fcb30140b2df36f3052a0fe9583a642c8d23e20660ddf7809c8a4b65a732f0f71f07631108a56ad2c46f1186298749b7bb73b8dff2ce17e7d2388ce817fc74f7b640d85144f4345a1ea5f3e55bdcc4fefdbd65ef941d266bdcd266b44a31eb6e0890d8cfc5c5e35a6977ca133ff53de6d6f8a896c22a084dd6c2c3b4c49b8302ba25e6f8b94c8fc71805b203668e2248ca621e10905e43c6f117db9e0d919fff224d9a69f373a4e2188be971a3669d448f450a799f733ac75ab7c88c66dcfb4179332d99301c618deab6eff7497c9ddb85a77ff7658a43b12396b037fbafb7b5e06685dc83781883c74f8ba933b5ee112f0a20", 0xf4}, {&(0x7f0000005080)="20af61723eed664cbb152f47fa6c8809b36e3d8ddde17d32f1093d4f10098896669cc0acf3aabdcb9f4b182a8490831e37612fd06d81b2818b5edbee398840e427e293ef074a510192fbe84c8121b87112af1aa97f27a1d7f7cf5353ecbe264c3d56c49a93ef6bdeb2cac195f06a836168", 0x71}, {&(0x7f0000005100)="20e8869540e87614ca115b3974cd8c3d94d5ee00580bd6453ed26c8b3d9e441f", 0x20}, {&(0x7f0000005140)="a50ecf9d0f18ba57d339c226b578b5fc96c5605e9d66b6f325b45402daf468ccce450e2cfd4e839be84fbb5d8aaa4f895074ad7f5eec18c7d34606fd256552d56d2e8665e51ed2c79614729870744273c343d5a8faf394252cdbfb519c6949d37589120cac817f025ecf69c9ea3772b8035229b5507ab3717b31c3229effaf71dae4935eb947a14c9a9a78fb88026167aa7f6984b8e4f84f961bfed88e927542e4a3eaa6a9354468dd74dc896064de0f77be817c05f476fccdf075bdf1ba755f1197d369fca76c79bd0b7761fdee62a6966ef48254949e9d5c3f4280d384ec29cf0b", 0xe2}, {&(0x7f0000005240)="9c50487ae204000c86c71b778c5fefda26d2b6c50b393c9dc4be5d37b8137e8e2431a0837310d6d008bfa6579dc51076615dae8c2d58681a9ad391c195c31dc48dfbd31a919126688e3f99b73d4d9e05cd13497e43b933279dea44c6364aa527f4ae42d0211cc8c0da29ee596fe9ac4cddd71f565e2c774a74dad1960c0d37c70b84f268f2cd132c3b76da7275ac5fa61674f3a741e7f4b25bdbd95548e26fbfca1927ab", 0xa4}, {&(0x7f0000005300)="eb2a668b6d1b5ec68b5378bead28852eea804cdd0586051104af4a8293473e9588c68e25f99a83512c86b9bd81603c2b140a9794fd89ee8b9cb8cbe81c7d52e8fcdf21c11a27c71a646930762c2c49053fde6b95989fab43935e1d3504f800ef747e41b8c91b246971351f6f7fdc11d56e8d3849a6d6684e296266b7dea79f2844e815bfef32a06000b0dda2b3338dba56f7aa969e27f119fc3487aaece2f1f2fb0906b2438b56590e2e105c3c9052b1475115d4da9fb3626916284dbe4bcff6c8fd8ceb9cd20d90e3fa603a806f653c706bbdcffc290df9c40635ab581984e1f0ff717097f66bab9d7effaaa6bdf4a7089507451f80a1a9ad2ab15c43639e729e02e42b4d03c7405bd892ed6db140b2e03e00d3baf48144e55e1a0ed220c1f6a32df40f20da2f000598d4765e8e98dbfed19904af0ba62fd2ac89178cea2a266387c29be7273e3e055029461adfa0f0e8ab51fba6ad85806205b5cb10a528d207a0461615022464288cadb35003d18f81e9c0265bb4c2ce9eb59dfde45c6572394c9cb00827526d439f5f34a8536590e3b9472657c29c9d076c2a9bae2b958ba8b99e410492a946ad9bd2e4ea2f63c576e833d6bd8278fbf55f768b3f40915f380e6d8d613a8f8d883bcdee59f7876dbb865ac3a3b0519cb4149ae4ae914535442f11156dc239835b22b5c1d8b0819e7cc39032065b142f389951193c37e35d36472fbe826d1fa776c1742f9ffc96c60f8846ab6298a8ee340a1b620e8a79018c0a2c5943a4a0cd21bd7d716cff980c6a7dfe8a1c2e12f60c898a3d682ba1c51675ab0c795b6b4c45469f305974dedd823e6018e3c996fe091f78d588a65a8b1b4e37bf17047411d3dac363f495d41353547e4c9c1a142913720f41fa8f9959550f0ebac0df05ee5457721e5e20887a7cd0e19a3af6b2ef260e887bb1fa3c6270047b624d1edd000638e257c7f830d46a144f36e0b0d63da4cbd0d7ddea1ed744b7a0fcf1e2ebea3015cff6675115ffec71581363c988b8f0eff3ab96f820cc55d04649f64311514c92b74e183c4b9c2defc6af3c5edb35b7e3cca2a4caa37da78275d3bd5cb4225d49f68daa8fe92aaf4b1c095d35d088bd9f0f327a6ff35ec39b73e37e6f288ce995449bd173c6ea6c4ad92983509d65d45768d68af0e1880bdbee968187dab0740b3431fb5cd3a95a1dbacb8c1b041977f7a3e293f8e67ddf676aad1baa09f2d69b0ce586c9583bca1c22f1b399485970eee89683b58b774047649f27cb1b19c1e8e86dcf936a982bee13bdc5660fd79bde6fff088947eb013f6cc8c17835b83f5055a25b52ea240dc2002110d39e3f06bc03f2fcf0ca3875b02a64390514fec9527f21daae79a0c105defbb0b3b08aa0cd12b452cdc34f4c8922613bb637cc574f239bfffb8803859df69d0c92e118be772d6679aec7f456cb30cb42e6a489d18ac7b6d107901965db5833563657aa81d4d435ce3bee22391cd87e43ecc358c48b8d682a02dcaee51e5f1694cf0cdda1837af22c17a90b197d5f47ebbcd3f987891941870c8f5d4b9c0df4f195b71349c6257069dfba09f189dc3c39acc27bdaeb2643df2abff6062613cc46c4993efcf1fe1a6f00cae545f675659654666a17ed5f54951bc1f5f53fd280cd39c227a34c2651987059800dd7fa8d1931b3551e3a0ec974e766c92a62574f9158773ed7b725dd48b5dd06734581172584e47219ca20f788d0041e8cf3fdc77f4d2e2871d89379b07408cfafd0bf9edbb6a204e213ec71d4da4740202d235c57eda55ddbe0cad4953b5ef908000044bce993e851a0cef55eaa833108a502117b18234955a161a4a1f0dfd4d105d74a15422087bf51ca3c86e43ada93922f3c48cca5b347b73623604ace327e2b67565aa521586f59d2932f78b4d6fadf2d9ba5c7f28bdc542bbd0b2a8937e0c170ca51a6b7145c4054cf00530969550e9339720934801ae91ea1b2d2898292790a913c6e5182d3408cd08d36ea362f1f1ff8b534b93ac17fc4ea4576a4cdd0e3d55307a7ea3732d87e21ae6c1ab39ec8a287a81d4a2a4cc21da2c15a644531940f73fa9b4a4dd9e39daca7a1f1a722953735b06ede54600260a3ad14474466f09224939a66f0115946620d1b0c33bec38e8504ea8d3ee35213f4fa1cc5497f8cf6e5d58da6e5ae3082252680606bbb082210175b2899a45493cbe629e3f8e233093b179017ec9bd4c33c531b90a0d9af0188fec5ccc155d1051c094a348764b6f36af27f98fc026a52361fe94e54d075c974e93cbee0d09dbf4b41f66c0aa22aab6f814a51c316a30afdc59c44ee1238f4c601a85039e93076230aee7543852e8cd7263561f90ba85248a48f806ea1f2909e61484bf2064e33b9e7374104b48e660bb5892d40c4dac04bf6d5d4f069ded8c7e8bebb34fe5748e70068750b3d7a04db336b9925167305fccc80516b6b4461563794d9463fd7fd0dac7186369e98facd8917d8f542c056f6bf6f093c843871605e56c10a3c37aadfd3669c1a0bb950a7b6b73fac79f11b87dc60e6efabd7dc873d4ccb7d9dd40ecbdb0487d3b13d204895fccd4263c54c1c9bea4770ecdffb888845b988c52f4e73b05bea4071994edc3ea1caafd44143daf7518a54b487124a5898dd74ddcd3fe8727de25655d0ba855d7c240f819f921df6c52775afa43c2688a494a6657748aceda57116f4ea820a0822300f8ab46cfc0745c909d5b56ad4a3cbe9a9b042cbb29373c1ff9a0948eb4483a1bb4cd8e262319c0d3be4e12a0cd3a7150995f098cc75800db4b1daa9296da0d317745226493a0ad1cb19d1b477e568ebb30f3514b8cf5503e3e475d59dc48816ad87cca78b4397a7b655be91b00142529a7506aa9c6c643cda205a8b7908488df4e2ba59584bed1a3ae2ae40f9c500e28b6e9694dde241a51784bb4ad6238899a5613a80b56ccdaca968e872d0b673512e44c468fa30e32fad617f038e23ef36cae20b925b8fbd8fa803ff1e52c6ccdfad01e7363df6bc9a0ae0aa6ce7d8fe7d8ba45ff36668d2e99e5e77e0d2e18616c964156a7947d9be0aa8b9e053b79f91307b28b49cc77d464ac5f57281cfd5e385e18fd076473bcc2dbfc9205d543cc8ec140379eb9be1c79174637d3127026372580b2424599ea6b0668f51ab56246b2bada0ed5e68ba6f1feca6a0aad2bdd9bd48ea753037b04e57f9a5a8dbad4661f75b617db9484fc4a4d6751437e6107b1dfcbb858fc3849b5c45bcc9463a2f8316753552a1714154a6b9f9227438c37c8c4b2ba25ac1c1f858b5e68a74645e25f8fe7493615e33ac115be511816afcced87d5e482d26f3034b4263b5fbe88e6993ee9aba28693a20b3e6d2e061e5e5fa72028dea65c22bd79b6154a6d40a0678589f1d6e129ddcac45e2bd32aa33a37c1b5fb22acf6befa59adb7ebf75ceaec87a8eb03105638f49aae9a34269997028575fc99c65f8b2bdb7e414d2b0229a85b7c7246ac7c7d29081b5d21478f531b0a5ba54ebeb687e381d612ee9dbae4c12e511eb291ae980135654a2b6da50ebcbd0a3f54cdb03d9d0630a6fb0a9cc03cc6471b5e77d7601b9240d647a4ca696f0123a2713112c094e5ead1e6158ba87cbc7f6de1eb72bd0c0803e6fc89cee4f3818070d02c7217ef5068162228f140cdbf0de7274dc65938c12296a5e6fdd5012342d132d62b7621790863182d50a81aa56a425ea8bc4ceaa5909d314b73e3a29de9a9837278ca615410e724be8aa72d9dc2d5be63652dc66b949a24d6bd5ec91e7ef34fa515343f430012c935532cd49dd56e067979c18990e824d4f76e81fdd0c3ef7aa62e9923caa2aed326559cf3a0a63f1252b22885ac1b60266987c0148869ffd61608461dd712b22b9ec7773bd5405adbb53bd521c97954200cb61c41576fa7b6471f3a78bbb0f35f56d79e21b46f957911459492495597cf1807fb089adf4422c2eb9422e79ed2dc1cf886f830515b313aff3f49bc3c22b4f895b1ef924d31a027755d280260f8f1b1fc1597be5b9f56c6b81909ee2ac220cf54deec924db54a3ac8db4eb86b8d2450bb63f486e95abcc75b27b06ed069b6869e6869ea6122ab5ad0f602bef15d21a4fe6c2519e14ec39a868e14dce3a30e684ac26ff2508cfb6a7f74b351ca0d317b2cafae5905c82955984ff544f1512aefe5201a6c63c9e0d8e8ba063db723849380551b3cba7f91f149c0946237d0a4f174a53423d984e56e757fa23bc165cd6709ff559e8a40e0fff3d31a7bf2e5ecced90f48e1d07307c264362ecf71655b7cf7a2a3ea3272b81c8003d52745f519e8edea23a7a1095bd8ac6160108a92b2d131b046850d15e0af30149c3e34b01a6b70139153d59009e7c2d2b11fdf1ac06fdd56d030a0ffd35ecf86828d5c9c66a6c0a8d2a1edb05d0704551f4a8525dcbd9f819533bd9c2d219ad47d8f8ea321eeca2a6518295a9bcf87f01dab40c68f322f0b14d948530e2e07ecfe0695fde6f099e1fda58ac16b35b265de7ce305dbffb908717dd977dac1c3b845d5e86ff42f502dc2f12a48ae54cbb9c90db8198e8b87ffc574bec2729d25d35fa6caf87f087722e304d63de20acbab14b5495c8f2f98a24306f997e84a9c4bdb46c5f63c8ab5c30dd481c9e5f63423161a8ebc1b4febbd9d2e4fd6fc8193fdc716f4566cba0ee57377d9bd28d6a5a3ce77c6292b7f85e18ad9d6c35c0df1221d8b70b10c4a915638b074e33bf8e55debaef0505ed1e2abe8e1aea15545bce4ac2a73ff27767c2eae4fd86746e29938324370bbf33e44e25d323766d1a29ba6ae74d2443de4b8981c7477d06f18b5bdcc0c625ac01a75b25ac6635a858afed1ac59ce05bf14e40ead521af87a737b2fff6f0f97afd30631905944d188235ecc54094f03d520ce95aabf2323b293ad0260a1531cb0af9354a4ac5be70ff98c8c18a9776e901ce3e1da36a75a1d538328825103ec9d6d649c4cc44399d87898d078085847b4c9f208949383f4f267cf5f9d95440771692a642c139cbb1f7e462978177bb9abf06ff61a00e820bfd53b9a2b7e3a78e9ed1f2a122de77bae72a74a0606487b1aa024ba05545ecc31c18da35deee14e181639f6e4b2f155d32fcbffd9ee84dd2f37e12b9dc954a673c97bebb42d9fcf7c1f191018e0b29073c6e66e6f88489a94e118689a0e4b933f7e040bb7391795256f94ff1d299a587f9f2d41fc00cc7cc6403e070630567d42486dbff18b648e659c6bc43f5e51fe474a0a0dbd5c0b663e607bd8d38e0991e88c787e06d92f1bb164a263c9585b40454d781a81ef5484fb8ad9f86cde06f7b697f9aa27696ff6a0bf27f8cb1289a5782530813f184eeaed274f6241d785becf8aee775d5b0e24477dd263767e1b5ec6b610052585f54836d186ed55465c4b1feb280f2730210a3523e0357ac8d36acdd5a89b30e676a971611ff22ee85bd9867a1dcbff5f52d7aab35267c10efc4706de0d58ea13d52dc8dde947db768ce75c1752e21a689aa01d1ae58e59dd90412817b732f2a873fc898b048c97f29deb77197ab4e635a1641a2ac2a33260c197a13090118727ea23efc6b5ddaf920cc64164fd18f0ec611b5ea8fc16e8b4d1bbb2ff3d19ea657a9c04e1bb0a0417b598d0d0823c413e07fea47352d91b1ae4eb34742326f2e92d6d006a0ccee84128ba58fb0b3426e44a24af714d34ced0289c82b569a5f3e56f1f0b84cdd55ae60b0428f3553ff04eaffebde358efbb86a91dd22e5732709c6ee34516037d2299a1cdf263c870b6889", 0x1000}, {&(0x7f0000006300)="a263b99b13d6c449c6740b8aeaec1172915ca7c2222e0be410e2aec44d30416e60d6cc6727234521f5a95c457a717a19cbbf70b54f3eebed62daafe3e2b5686f342055b68319c559230db09961236908d00ff8f320e402663a1d2b13d216de998a526aa7f6e4c5e1e6380bb3ea0cc143ed4d807912d03692ed3fdf07", 0x7c}, {&(0x7f0000006380)="a29bdaa9090e7efe61d64c6f775c980434fd489d04d5b55753eeae1377a34e6ab1e01d", 0x23}, {&(0x7f00000063c0)="8396fc73ee1c499c8acefccdbecd756ae1459488fea501a8e42dca56929e872a9a859864cf734e3610074dd784365255d6ae4e0655b216873d4bb67590d33acd4524e2301028bfbb4de5f39cc3c7db528919a5aac5e1bafa81057f789dcc58de9e71b6a8e4a601b0d9e3", 0x6a}, {&(0x7f0000006440)="30990a8e3f43e469eba18954f804f11e0ecf5c7ab05fed24d433b2fc03b66584f345c2141bf3096a", 0x28}], 0xa, &(0x7f0000006600)=[@cred={0x20, 0x1, 0x2, r31, r32, r33}], 0x20, 0x40001}], 0x5, 0x4000) [ 808.315445] overlayfs: unrecognized mount option "w" or missing value 03:38:29 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x8}, 0x0) 03:38:29 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x9a', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:29 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x28010000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xf0ffffff00000000}, 0x0) [ 808.483371] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 808.502644] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:29 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x1000000000000000}, 0x0) 03:38:30 executing program 3: r0 = getpgrp(0x0) ptrace$setopts(0x4200, r0, 0x4, 0x0) syz_emit_ethernet(0xffb6, &(0x7f0000000000)=ANY=[@ANYBLOB="ffe0ffffffffffffffffffff08004500fec300000000002f9078ac14ffbbe000000100000000ca8890788fe4f44f95a17124a3e7e09827308bbf538fb0d46af3de3a60ecfa960f4610846d1006a11fa4fc0abf478b676715d14f945b522c06f523083fa5951b202e74752a06d05cd71af47390cb88a54c6621dfe4842e2169ea53eaa4fbd0f7df68163322d2b996dd43a84293790d44e247cd6f809f0ae5b2ec29be329edb3944603d5ed69f370166307345fb5c11498f122dc16e4a63e6d5f91dbb3a96e1c4e4"], 0x0) 03:38:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xffffff7f00000000}, 0x0) 03:38:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000080)) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x1000, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={0x0, 0x3d0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[], 0x1}, 0x1, 0x0, 0x0, 0xfffffffffffffff9}, 0x8000) [ 808.701340] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:30 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092560090007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xffffff7f}, 0x0) [ 808.754239] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 03:38:30 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x485, 0x0, 0x0) 03:38:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xf000}, 0x0) [ 808.835842] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:30 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 808.911251] overlayfs: unrecognized mount option "w" or missing value [ 808.952459] kauditd_printk_skb: 15 callbacks suppressed [ 808.952474] audit: type=1804 audit(2000000310.342:389): pid=4523 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/450/file0" dev="sda1" ino=16590 res=1 03:38:30 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x2c6, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="870fb5c8ce5ad46e03da6f8b049e0a08fd8c8ed2385bc2659b1bda0871dcd75900b4f829b8f36257f01215b8d07849186ca4323c7b557849df2b6b7079b8ce006a1c302f2f7cdd32e0346da5576696ed71175e1c5f6589702c6ea54fe41c9f794587233586758e3a63a00e9786e25eea2a293facbff709f82de06b9631f5b1e3a44c03be733850ce28a72172cf41290c0aff6cb0bf18cbec0cfeb7b31f41f8676bddbaeab51edbccb53bb3d19471b2187001070721c4519eb2aeb238331d44643779ad90e6c94d9a63235d50c5aa54dada406bb9b48dda870ebb540a306aa0450dfe94f928d1afaec314e95ac5", 0xed, 0xfffffffffffffff9) r2 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x39, 0x440102) setsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f0000000340)={@initdev={0xac, 0x1e, 0x0, 0x0}, @empty}, 0x8) request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000140)='\x00', r1) 03:38:30 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xec0}, 0x0) 03:38:30 executing program 3: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0x980000, 0x3, 0x20, [], &(0x7f00000000c0)={0x990901, 0x7, [], @p_u8=&(0x7f0000000080)=0x4}}) ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000040)={{0x4, @name="84b6db1fadae2a70a0f1165fc3d3c2d322228ccf152b9ddd63813f91541d8b66"}, 0x8, 0x6f, 0x4}) 03:38:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xfffffffffffff000}, 0x0) [ 809.067233] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 809.093843] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:30 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) 03:38:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000010000800300800000000000000e000000"], 0x14}}, 0x0) 03:38:30 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x34000}, 0x0) 03:38:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r1, 0x800, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x401}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0x1) [ 809.234366] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 809.253004] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:30 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x03', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 809.429453] overlayfs: unrecognized mount option "w" or missing value [ 809.452142] audit: type=1804 audit(2000000310.838:390): pid=4563 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/451/file0" dev="sda1" ino=16592 res=1 [ 809.492505] audit: type=1804 audit(2000000310.838:391): pid=4563 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/451/file0" dev="sda1" ino=16592 res=1 03:38:30 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x15, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:30 executing program 3: syz_emit_ethernet(0x37e, &(0x7f0000000000)={@remote, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2000, 0x4) write$P9_RSTAT(r0, &(0x7f0000000080)={0x84, 0x7d, 0x2, {0x0, 0x7d, 0xcc9, 0x4, {0x1, 0x4, 0x1}, 0x10080000, 0x8, 0x4, 0x2, 0x3, '}}[', 0x8, '[($nodev', 0x4, 'eth0', 0x3b, '!*keyringeth1cpuseteth1wlan0vboxnet0security),^*\xa3^@system*)'}}, 0x84) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f0000000140)=0x3) 03:38:30 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x9effffff00000000}, 0x0) 03:38:30 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002807008bff9c6c832e000103b98b1d00"], 0x14}}, 0x0) [ 809.577495] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:31 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={&(0x7f00000002c0), 0xc, &(0x7f0000000480)={&(0x7f0000000000)=@gettaction={0x28, 0x32, 0x11, 0x0, 0x0, {}, [@action_gd=@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, @TCA_ACT_INDEX={0x8}}]}]}, 0x28}}, 0x0) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x400080, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) r3 = getegid() fchownat(r1, &(0x7f0000000080)='./file0\x00', r2, r3, 0x100) 03:38:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xfffff000}, 0x0) 03:38:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x2000, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000140)={0x3, 0x3, 0x0, [{0x1, 0x2, 0x10000, 0xffffffff00000000, 0x54f, 0x7fffffff, 0xffff}, {0x1f, 0x0, 0x9, 0x3, 0x9, 0x1, 0x1}, {0x200, 0x6, 0x8, 0x1f, 0xfffffffffffffff9, 0x5, 0x5}]}) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:31 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:31 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 809.718440] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. [ 809.755573] netlink: 12 bytes leftover after parsing attributes in process `syz-executor3'. 03:38:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x300}, 0x0) 03:38:31 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) rt_sigsuspend(&(0x7f0000000000)={0x37}, 0x8) getresuid(&(0x7f0000001300)=0x0, &(0x7f0000001340), &(0x7f0000001380)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x80000001, 0x4, &(0x7f0000001280)=[{&(0x7f00000000c0)="1338cf2fde13de54b4b8ad21f4472da9614b120c92981f705225a29155f0ff219bf8d250b057328f36a7699e40213704df1c94c9fcc6dbe0fe71bb97f74cd58e9d214b018b9e3ac0fe7cd4570bc95442747ed006a83c7a80", 0x58, 0xfffffffffffffffe}, {&(0x7f0000000140)="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", 0x1000, 0xb0fe}, {&(0x7f0000001140)="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", 0xfe, 0x4}, {&(0x7f0000001240)="2a89638b40c7c5cd417812664eae17a263627e62abc9ecd1a06c9b7a82cf0a1622a9459392627ccd803c4c2732a07389bcb3c8a7603cb22ee2dcff93", 0x3c, 0x1000}], 0x1011, &(0x7f00000013c0)={[{@usrquota='usrquota'}, {@quota='quota'}, {@errors_continue='errors=continue'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@appraise='appraise'}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@uid_lt={'uid<', r0}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'vmnet0nodevposix_acl_access'}}, {@audit='audit'}, {@smackfstransmute={'smackfstransmute'}}]}) [ 809.841792] overlayfs: unrecognized mount option "w" or missing value [ 809.846607] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 809.902952] audit: type=1804 audit(2000000311.284:392): pid=4597 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/452/file0" dev="sda1" ino=16559 res=1 [ 809.941140] audit: type=1804 audit(2000000311.284:393): pid=4617 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/452/file0" dev="sda1" ino=16559 res=1 03:38:31 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x30, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000300)={{{@in6=@mcast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000400)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14) accept(r0, &(0x7f00000004c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000540)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000840)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@initdev}}, &(0x7f0000000940)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000000980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000009c0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000000b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000bc0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000fc0)={{{@in=@multicast1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@empty}}, &(0x7f00000010c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001100)={{{@in6=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000001200)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001240)={'team_slave_0\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000001340)={0x0, @local}, &(0x7f0000001380)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000013c0)={'yam0\x00', 0x0}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000001400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001440)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001540)={{{@in=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast1}}, &(0x7f0000001640)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000001680)={0x0, @initdev, @remote}, &(0x7f00000016c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000001700)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001740)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@remote}}, &(0x7f0000001840)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001880)={{{@in6=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@loopback}}, &(0x7f0000001980)=0xe8) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001ac0)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000004340)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@initdev}}, &(0x7f0000004440)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000004480)={{{@in=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000004580)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000004700)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffff9c, &(0x7f0000004740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000004780)=0x14, 0x80800) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x24, &(0x7f0000004800)={@empty, @loopback, 0x0}, &(0x7f0000004840)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000005100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4021000}, 0xc, &(0x7f00000050c0)={&(0x7f0000004880)={0x828, r1, 0x204, 0x70bd2d, 0x25dfdbfc, {}, [{{0x8, 0x1, r2}, {0x254, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffd}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x15c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8001}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x101}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r12}}}]}}, {{0x8, 0x1, r13}, {0x84, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r14}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}, {0x8, 0x6, r15}}}]}}, {{0x8, 0x1, r16}, {0x74, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x10000}}}]}}, {{0x8, 0x1, r17}, {0x80, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r18}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r19}}}]}}, {{0x8, 0x1, r20}, {0x270, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r21}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r22}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xdf63}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xac}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r24}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1000}}, {0x8, 0x6, r25}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}]}}, {{0x8, 0x1, r27}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9bf}}, {0x8}}}]}}]}, 0x828}, 0x1, 0x0, 0x0, 0x5}, 0x4000840) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x2}, 0x0) 03:38:31 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:31 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x400300}, 0x0) 03:38:31 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 810.231718] overlayfs: unrecognized mount option "w" or missing value 03:38:31 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)=@buf) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x17c, 0x2e, 0x800, 0x0, 0x0, {0xe, 0x40000}, [@generic="be59333ff031a37e8e7a74dfefc244fdd32ed9a51f5c19ea9cb4be40bce9a809d3d734424b00396ba2c388b7771899d0a67dc137b8ac1402b134ac94bf39c5a78860ee9ac2f5c88fc6da5dbd850f63d0ed2d084ed0cc8d17f083aec434fa6fe7f9dc87aae07958d3ed7a4e2fe89ea08b11b040f9f596526e303b6af4afa4db2bd980ea9c34999f8b44aea9fb635af0c03c6ce20c8d70810378fb507a", @generic="52945359e86fd25cdaa0681418151f7a1fa55054fbe893e9aa6b31be5a6de6bff4748c9c836e650cb1a8532ca6547510dc4565c4d0ec4ba33917f7dfc6a608f7e74ac8bd3dfc4518577880649b082d043f586284451eb77af45b0b09498954851aea361728c9b2738362ab1f014f9a141b5c6e12394044759ea10a117b1cb599b4dcef406a2a81d9152d71448ef0d078ce34329a18c6733544169a2dfd0d40ee417ad175097b4da272f7495f9631a393d040e9c6100bc2bcc9fd30176d5a161ffdc06b72fb2fa7cc6a1450"]}, 0x17c}}, 0x0) 03:38:31 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x2000000}, 0x0) [ 810.271977] audit: type=1804 audit(2000000311.651:394): pid=4642 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/453/file0" dev="sda1" ino=16600 res=1 [ 810.326688] audit: type=1804 audit(2000000311.691:395): pid=4642 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/453/file0" dev="sda1" ino=16600 res=1 03:38:31 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x8203000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) [ 810.398461] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:32 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x4, 0x500) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffff9c, 0xc0086420, &(0x7f0000000040)={0x0}) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086425, &(0x7f0000000080)={r1, 0x2}) 03:38:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0xf00000000000000}, 0x0) 03:38:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x400800, 0x0) getsockopt$inet_dccp_buf(r1, 0x21, 0xd, &(0x7f0000000140)=""/197, &(0x7f0000000280)=0xc5) 03:38:32 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:32 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 810.767480] overlayfs: unrecognized mount option "w" or missing value [ 810.800607] net_ratelimit: 20 callbacks suppressed [ 810.800615] protocol 88fb is buggy, dev hsr_slave_0 [ 810.810816] protocol 88fb is buggy, dev hsr_slave_1 [ 810.823730] audit: type=1804 audit(2000000312.206:396): pid=4662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/454/file0" dev="sda1" ino=17217 res=1 [ 810.853399] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:32 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:32 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000000c0)=0x1ff, 0x4) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000140)={0x0, @aes128, 0x2, "6a3559405414d86c"}) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x80000, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="a7feffff2e000103000000000000003ba633ccfcbb1923ff30d4000e0000005d2293a29e8842ccb891e21fed836e63d17c8f329ada8db23067740000000000000000"], 0x14}}, 0x0) 03:38:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x3f00000000000000}, 0x0) 03:38:32 executing program 3: syz_extract_tcp_res$synack(&(0x7f00000010c0), 0x1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000001140), 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x6, 0x1, &(0x7f0000001100)=@raw=[@call={0x85, 0x0, 0x0, 0x5d}], &(0x7f0000001180)='GPL\x00', 0x790, 0x1, &(0x7f00000011c0)=""/1, 0x41000, 0x1, [], 0x0, 0xf}, 0x48) syz_emit_ethernet(0x5e, &(0x7f0000001380)={@dev={[], 0x18}, @dev={[], 0x13}, [{[{0x9100, 0x0, 0x200, 0x4}], {0x8100, 0x8000, 0x3, 0x2}}], {@canfd={0xd, {{0x1, 0x6, 0x6, 0x217}, 0x11, 0x3, 0x0, 0x0, "627fd75ecba29b89f5ec4a3c2ac38bb3eb5d4736118b5e1cda9f2aa7860fac54faaa38c4b57e0b32a60a4e4fd85eb95b6a5d0a8a6662968e53f67bd9718690de"}}}}, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000001080)={r0, 0x0, 0x23, 0x1000, &(0x7f0000000040)="156fe9780b9b53e9bb39a1dd1d25174eb23833783c71e23f25a8741fb79fe7d03e3c90", &(0x7f0000000080)=""/4096, 0x2}, 0x28) [ 810.891345] protocol 88fb is buggy, dev hsr_slave_0 [ 810.896442] protocol 88fb is buggy, dev hsr_slave_1 [ 810.905702] audit: type=1804 audit(2000000312.206:397): pid=4662 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/454/file0" dev="sda1" ino=17217 res=1 03:38:32 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xe00000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xe}, 0x0) 03:38:32 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 811.064130] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) bind$bt_hci(r1, &(0x7f00000002c0)={0x1f, r2, 0x3}, 0xc) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="0000002e620d0000030044e2714518244a36075400"], 0x14}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0x77, 0x7ff}) ioctl$SCSI_IOCTL_GET_PCI(r1, 0x5387, &(0x7f0000000040)) 03:38:32 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs<', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:32 executing program 3: syz_emit_ethernet(0x91, &(0x7f0000000180)={@broadcast, @broadcast, [{[{0x9100, 0xfffffffffffffff8, 0x1}], {0x8100, 0x0, 0x2, 0x3}}], {@mpls_mc={0x8848, {[{0xa10, 0xd8, 0x7f, 0x1}, {0x9, 0x5, 0x9, 0x15d}, {0xffffffff, 0x4, 0x46f20d02, 0x3ff}, {0xca, 0x10000, 0x7, 0x1da}, {0x86c, 0x7f, 0x78, 0x95}, {0x0, 0x480, 0x1, 0x100000000}, {0x400, 0xfffffffffffffffd, 0x2}, {0xfff, 0x6, 0x1, 0x2}, {0x7, 0x4, 0x80000000, 0x1}], @generic="8f7d88ad8e33b90cb6f399444babaec947c46b0409e60d0b032dc89bb71deb6d66df8495a86a1425862d0e7ca643a625204d2a3f461ec85331afd8f256f5fc02b0cfa49d74c8d976bd3e7aa167a0628f5805df16cb7475"}}}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x40000, 0x0) 03:38:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffffff00000000}, 0x0) 03:38:32 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092500100007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x10) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f00000000c0)={{0xffffffffffffffff, 0x1, 0x8, 0x1, 0x5}}) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:32 executing program 3: syz_emit_ethernet(0x33, &(0x7f0000000080)={@random="7c04be4186e1", @random="9869d41d871c", [], {@llc={0x4, {@llc={0x8e, 0x7e, '-[', "489f12181a5b3074dbd99295a77e1e187e4cc9a9abcf7c507f4a301c078707b97b"}}}}}, 0x0) [ 811.292851] overlayfs: unrecognized mount option "w" or missing value 03:38:32 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 811.327370] audit: type=1804 audit(2000000312.702:398): pid=4702 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/455/file0" dev="sda1" ino=17361 res=1 03:38:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xa00000000000000}, 0x0) [ 811.445962] protocol 88fb is buggy, dev hsr_slave_0 [ 811.451104] protocol 88fb is buggy, dev hsr_slave_1 03:38:32 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xb403000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x7ff, 0x141042) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f0000000240)={0x0, {{0xa, 0x4e21, 0x8, @local, 0xdd2c}}, 0x0, 0x3, [{{0xa, 0x4e21, 0x8a, @empty, 0x5}}, {{0xa, 0x4e23, 0x3f, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3}}, {{0xa, 0x4e21, 0x1ff, @loopback, 0x3be69f0d}}]}, 0x210) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x140, 0x0) sendmsg$nl_generic(r0, &(0x7f00000001c0)={0x0, 0xffffffffffffffef, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[], 0x1}}, 0x0) 03:38:32 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000000)={0x0, 0x10001, 0x30, 0x62, 0x316}, &(0x7f0000000040)=0x18) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000080)={r1, @in={{0x2, 0x4e23, @empty}}, 0x8, 0x25c4, 0x4, 0x7, 0x1}, &(0x7f0000000140)=0x98) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x2101, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000180)={0x57, 0x7, 0x6, {0x0, 0xbfb}, {0x0, 0x1}, @ramp={0xfffffffffffffff7, 0x38, {0x7, 0xffff, 0x9, 0x4}}}) 03:38:32 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xfe', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xfb0a000000000000}, 0x0) 03:38:32 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x300000000000000}, 0x0) 03:38:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x101000, 0x0) write$FUSE_GETXATTR(r1, &(0x7f00000000c0)={0x18, 0x0, 0x6, {0x4}}, 0x18) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:33 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 03:38:33 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x96', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:33 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 811.851861] overlayfs: unrecognized mount option "w" or missing value 03:38:33 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xfd030000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) ioprio_set$pid(0x3, r1, 0x4) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:33 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000040)={@broadcast=[0xff, 0xe0], @broadcast, [{[{0x9100, 0x81, 0x1ff, 0x3}], {0x8100, 0xffffffffffff8778, 0x10001, 0x4}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 03:38:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x1000000}, 0x0) 03:38:33 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:33 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x408000, 0x0) setsockopt$inet_dccp_buf(r0, 0x21, 0xe, &(0x7f0000000040)="f74e4cb7105d239083230e3b785e29020608ec1ba9ea92ebdb8623215756d85082946e471c506f36e747cb97b3f7a37741732635017b58afff6dd1a8f3ebef5e74047be5a0d6c7d5c17f539a81289ca8bf17d286cd9d04ef74dad75c49f197e718f958e4a5eeb0a32f2effdd4506ca89fac003eb5b526934726a96ddd079ec8f365b776c5799ece01b0ac2b34ab51b73fd917f8a1f9393d5b00d8bb6aefa7537620d94a28d0f9257fb03eec35fd64dc3535b164f2e0005cbbdbc2c32ceed7ddfec4edbc42e3f", 0xc6) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) 03:38:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x300}, 0x0) 03:38:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0xd, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 03:38:33 executing program 3: syz_emit_ethernet(0xc8, &(0x7f0000000140)={@broadcast, @empty, [], {@mpls_uc={0x8847, {[{0x3ff, 0x6, 0x9, 0x2}, {0x4000000, 0x80000000, 0x6, 0x3}, {0xfff, 0x8, 0x9, 0x1}, {0xfffffffffffffffb, 0xfff, 0x9, 0x800}, {0x0, 0x8, 0xff, 0x9}, {0x100000000, 0x200, 0x2, 0x3}, {0xffffffffffffffe0, 0x7ff, 0x9, 0x4}, {0x887, 0x7246, 0x8, 0x3f}, {0x7, 0x4, 0xcfa1, 0x80}, {0x7f, 0x9, 0x49a9ff5d, 0x1}], @generic="3ecb0c63b987ad9c782e789e1679fdee9965c5b7f4f2c6aa7df87b6d26aed723ebda04c2b4bab53395347c2db5ed4540dc570c8a8e99e5327e21a799425c67c580876e519d6165b6363996cd3a2ccee072c7cad61aa7148c43c88a310d0ec5fd339da08638dea9f916da6a373c850c0cc36246bbb187705bf238ae7dfdc1d83112ae88ee69ceca1dd7ca19bde53e94d3b80b"}}}}, 0x0) [ 812.196123] overlayfs: unrecognized mount option "w" or missing value 03:38:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf00}, 0x0) 03:38:33 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab0925000a0007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:33 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 812.252698] protocol 88fb is buggy, dev hsr_slave_0 [ 812.257907] protocol 88fb is buggy, dev hsr_slave_1 [ 812.262716] protocol 88fb is buggy, dev hsr_slave_0 [ 812.263062] protocol 88fb is buggy, dev hsr_slave_0 03:38:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x2040, 0x0) write$P9_RRENAME(r1, &(0x7f00000000c0)={0x7, 0x15, 0x2}, 0x7) 03:38:33 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xb, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x28}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x42000, 0x0) syz_emit_ethernet(0x2a, &(0x7f000000a000)={@dev={[], 0x1b}, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2, 0x0) ioctl$BINDER_SET_MAX_THREADS(r1, 0x40046205, 0xfffffffffffffffa) 03:38:33 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xf00, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf0}, 0x0) 03:38:33 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 812.432121] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x3}, 0x0) 03:38:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0, &(0x7f00000001c0)) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000340)={0x11cc, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}, [@typed={0x8, 0x46, @uid=r2}, @nested={0x10c0, 0x8a, [@typed={0x8, 0x73, @uid=r1}, @typed={0xc, 0x2c, @u64=0x6}, @typed={0x14, 0x1f, @ipv6=@ipv4={[], [], @empty}}, @generic="28294515061c5a3a7f54eac65374e5bc40ed3b75bc4676327b907b645f58df925a2a960ffd706ce716e22913c2636915d1fe97be03e4ec25dd5949356b", @generic="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", @generic="e36f28036534b348ca08391506c5fa83d64ef018851b3a84938af115acc678bf0ae71ae4f5e23c6af0eb6ba80a3b4d53ca5e729099011f71a70c02fa7f2d1709142006034a8eac35e30a6164c3e98aafb9e011f61f79ae"]}, @generic="9568af6efe5a507c5453a49e1c67d49b02080dc96a6bb1a49b75bb14dc820ed80a2f2d4333745b9db91383fe8c4c78bfa23b02d4b5a239f48d4f16df67bd6154a4ac06c5f453718fe5e4b0345758bfb5665ca610bbaea06bd972aed1b0a0575234bf35697b6eeb780962b415e40bbdffb7a6c14d77ae934f751b3add81f1334b89ca70cdbd978381420ef21460096bd0d546bf98b5344dc6800264063e25ca954f10922fefbc415e7b28b508b5bb52cd166fa477cb5113bfdcdd0992229961d136613d76d43b3ee76cca5e18c618c1e7b4ade9f90c35ed7ba048a2795102da8061252064302d0c64a02c5525062812"]}, 0x11cc}}, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x100, 0x0) ioctl$KDSKBMODE(r3, 0x4b45, &(0x7f00000000c0)=0x2) 03:38:33 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 812.555579] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x200000000000000}, 0x0) 03:38:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) fallocate(r0, 0x2000, 0x0, 0x8) 03:38:34 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:34 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 812.680344] overlayfs: unrecognized mount option "w" or missing value 03:38:34 executing program 3: 03:38:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x1000000000000000}, 0x0) 03:38:34 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x2b4, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:34 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dsp\x00', 0x80200, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000400)={0x0, 0x5f, "4c3a53e882503ae704f76d270ae0e2911ed2ffc7e507607997c3542c5121564d8f45b7d58e850a89a679db3d473e97b80816a1319e4c73b1c1cd9094baa9433833fb9234860de20af145edaf19611849380c793a95f0044f5f95d4890135a3"}, &(0x7f0000000480)=0x67) setsockopt$inet_sctp6_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r2, 0x5}, 0x8) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="d31c53aa36de234f4e760158824e396c7993870aac9a1af47734a7bc087d6a7b5ccc47bbe43970233338b78f883999e6cc4e2f42682c1da2679c4041728d59b29060a3f9659ece0ec80e435b1a1a1613fbcf129afa2249b65a", @ANYRES64, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYPTR=&(0x7f0000000140)=ANY=[@ANYPTR64, @ANYPTR64, @ANYRES16=r0]], @ANYRESDEC], 0x4}}, 0x1) [ 812.846502] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:34 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x5, 0x8800) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) 03:38:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e00010300000000000000000e000000c7ca991cf77c45328d7cc553943d278e8c8f174a1fcddc6df238e79e4f0720"], 0x1}}, 0x2000000000) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80001, 0x5) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000000c0)=r1, 0x4) 03:38:34 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 812.971531] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xc00e0000}, 0x0) 03:38:34 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:34 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x02', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:34 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/4\x00') ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f00000000c0)=""/87) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x216200, 0x0) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000040)) 03:38:34 executing program 4: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x8280, 0x0) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1400000000000000000000000000000000000000"], 0x14}}, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000080)={0x3, 0x81, 0x7fffffff, 0x2, 0x3}) [ 813.087313] overlayfs: unrecognized mount option "w" or missing value [ 813.134647] __nla_parse: 23 callbacks suppressed [ 813.134657] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 03:38:34 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x7, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:34 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:34 executing program 3: syz_emit_ethernet(0x0, &(0x7f0000000080)=ANY=[], 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080), 0x4) ioctl$KVM_SET_BOOT_CPU_ID(r0, 0xae78, &(0x7f0000000040)) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) 03:38:34 executing program 4: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x200, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') chdir(&(0x7f0000000240)='./file0\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xd0, r1, 0x0, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xff}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5b88}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x41}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 03:38:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x3000000}, 0x0) 03:38:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) [ 813.382843] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:34 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffffffffffffffff08004500fec300000000002f9078ac14febbe000000100000000ca889078"], 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) sync_file_range(r0, 0x1, 0x80000001, 0x0) 03:38:34 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xde', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:34 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:34 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x7, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000680), &(0x7f00000006c0)=0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x4000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x4d4, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}, [@nested={0x11c, 0x10, [@generic="2ba1d801a244f77e66787db8b291e577761bd4f761c1464f75c96af9b8bc8810a9d1ed7deaece55aa9363dbfa6929849a1c46561d9c1995ec0a993148f6e2d28b564c1fffedfa819a339b592c56437aa50320da4f52747d8568e0f8233a55570db2aff41ce722e3a95c87b60", @typed={0x8, 0x2a, @ipv4=@dev={0xac, 0x14, 0x14, 0x21}}, @typed={0x8, 0x13, @fd=r1}, @generic="14ced96efcf182c9ea2f44c3641e8af47338ee773cecef5f9d2641ad6254f289d28315b82ba01ce2d4eb999e308a62d6ae5745c026f7cb84e9d8a336970f5dc95f65c264fa04134f8ee07f5f59eef2d76d523f37c7d1f54a6419df450176ed656ee62cdee40dead1b2f860d281d17280b722512cbb18bdfef1f3d45752649e66b14c7be25ee3574b175dfb5767acaaaa68", @typed={0x8, 0x77, @u32=0x10000}]}, @typed={0xc, 0x10, @binary="628a856e1288"}, @nested={0x380, 0x2e, [@typed={0xf8, 0x63, @binary="4e1fc52eb3ad059fdfa613ebbf15ffea0a6b3f5d7b23c723826a5e170c66870e52f47b180279b10512036b0a964f6f41c45f06f7564f7acd17a5da159710bab42227f33c8a2503d479c940d0ca0ea165872d8d2c7baa1e5de1ccb327079982aacc1d3b0a6856781943f93d0b9bc4ac6f8834a54f1953383d80bbc1b064f480ca4ff2544d6fa20c1240c5288c507c5b6e8f13c5845c3f0f3a43902e52cd8c53396423cdfac5302d5525c344b4a82a22db8ff3c922c20a06f52ca4aaca53fa308dfb0460ec28b6c489ac376bccc0dd78accc1206bc3354c9f98ff66f7badc1c5284ec098d59ccfbfa6ec74f7c5b78b15c98004"}, @generic="6682f9039bb2608c01c41f9998c3950392d66df68af66789e0dcf1ca4fc20a2532147d1d9759a4d0368b1bbf02cc00a3ca98918d7b221a9f1c0f58fbd0de67fd5c23e842d2aafda3dff033a72639c790b41023612b354843bfc51f762226d2e4a4c93d890c8ea408745ed4722b22b5735300ac6d6300587c7874adaa0eebad38a3ec4195a3093460670b6844ab37826fa018d63d6da00b897d230f5dc7e8b8029d689e260e9e978941ff2559bf5889e97bc904ae7b7ea68fb97cb2d78a657a5c1922b628a8d9fde0494605af7b8c68534d6cdca383e96af04bc6b476d3a7968438148de912f9cfc6c5f0c83aac916516", @generic="67e236a6427eb6108c68a0ddd713bd2514d2a1d6aac576e67b7864a63cc2d903b026ecdf1ca5bec3108d6c1be767303c1f4305d9c66d372809284b1a72d2ddbee648b1c3aa9ec0c68ecc02886c774c73745cb9817cd760ed88d82ff96e60e7a956545ab3307d29ddad3a93ee78c2268ea40090a9f993b1133f3c51d97fea43a8e39df74eb9085e693fb2899dd93a778217cb7b0cbf0486c7a12526ee27eaa9fe44", @generic="83cfa8d0c84aa38dd1ea6e307c1782371b44324637500373de0671e16766df68a52aa78752e6ebd33308d9abd061a3863f116348cf1294ced1d53365b065b474c18db9cf3955caa6bb8b8aed9865344e5e711515a7cb211639904a5452129f4a4c223380db0031eea5255c8a329635033296b81a345a63650d0468e2e858874a00cda105da459b26b142b805a75af040d94c32b9c7707995d2acf1dc738a0f", @generic="19043a0fe47e6e3ccb6cb555c45e856fc60f8726a29e582b1e38e86b21710d92a0e0f15d93205ff059eb4409b5e7b4f59cc27671d096804f301c199b681a", @typed={0x14, 0x1b, @ipv6=@dev={0xfe, 0x80, [], 0x21}}]}, @typed={0x8, 0x4, @str='&/\x00'}, @typed={0x8, 0x28, @fd=r1}, @typed={0x8, 0x51, @fd=r1}]}, 0x4d4}}, 0x0) 03:38:34 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffffffffffffffff080045e00000010000f5ffc9889078000000000000000000000000000000"], 0x0) syz_emit_ethernet(0x10f, &(0x7f0000000000)={@broadcast, @remote, [{[], {0x8100, 0xb9}}], {@mpls_uc={0x8847, {[{0x5c, 0xb0, 0x8, 0x8}, {0x4f6e, 0x4, 0x9, 0x1}, {0x89f, 0x100, 0xbd, 0x100}, {0x100000001, 0x5, 0x7f, 0x6e}, {0xaf7000000000000, 0x5, 0xffffffffffffffff, 0x8000}, {0x5, 0x4, 0x2, 0x400}, {0x0, 0x9, 0x4, 0x9}, {0xe769, 0x207, 0x9, 0x5}], @llc={@llc={0xf4, 0xfc, "c8", "34e910fdc1d40c43cfa6e3c7980681a069f359440399ee723086e54522d0dcdc40c3f0ae9a1cf79b90c5f2ebdd2d9bb99059cbc7aa0ab084fdb59729d2b4fef5274eec8e47128adf0504ec4d32cb15de2e3da6dced1de2458f90789864f81209ed99a91be3531fc7c3828e3255420ece7d8a5e7a76082da5433b6e1dcc21ad7bf7e7ba2ffa77f2bdcfd33038e436bb6afc7f40b2db26cc3ff281a97d2652c3d9a73c59e51b2edc874c6292b886d11b74f02bc960f58184fab0409788b15c5c98e6da39201bf9338ced7a11f8816081e66693dc08ed7d9d658d08"}}}}}}, &(0x7f0000000140)={0x0, 0x4, [0x1fb, 0x669, 0x33c, 0xeb6]}) 03:38:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x60}, 0x0) [ 813.561272] overlayfs: unrecognized mount option "w" or missing value 03:38:35 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x3f6, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x0) [ 813.649256] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl(r0, 0x1, &(0x7f0000000080)="bdcb828172dd908323b4a12e7163f1a9288b4c478c4034891b6a6e290a06b13cc4bcae498fa59ad5c07f2fbb908ac156689447d2508067aeee731e1f5b8991c4e18b9f00a98d6f07fdcee739daef6d5ad68ba70654b1cc75faa1b4dd334febfc07dd3b805378280479b11550320b8a42") sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:35 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xffff, 0x20001) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0x10001, 0x1}) 03:38:35 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffffffffffff}, 0x0) [ 813.817518] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:35 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xf4', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:35 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = msgget(0x2, 0x204) msgctl$IPC_RMID(r0, 0x0) 03:38:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="5bc679fb8432f329412b60337ca9e6b7a22ecea8b3d0ed5c5a"], 0x14}}, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x280000, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000100)) 03:38:35 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 813.857883] overlayfs: unrecognized mount option "w" or missing value 03:38:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xa}, 0x0) 03:38:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xffffffff00000000}, 0x0) 03:38:35 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x2c0, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:35 executing program 3: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x28000, 0x0) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000040)) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000080)=0x9) [ 814.009164] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:35 executing program 4: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_SET_TSS_ADDR(r0, 0xae47, 0xd000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:35 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xe00000000000000}, 0x0) 03:38:35 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x20000, 0x0) ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000040)=""/202) 03:38:35 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 814.199536] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000001cc0)={'gre0\x00', 0x0}) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001d00)={r2, @multicast1, @dev={0xac, 0x14, 0x14, 0xe}}, 0xc) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x20040001) r3 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000080)={0x1, 0x1, [0x20, 0x9df, 0x8, 0x9, 0x9, 0xe75d, 0xb02, 0x4]}) 03:38:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x6000000000000000}, 0x0) 03:38:35 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 814.282621] overlayfs: unrecognized mount option "w" or missing value [ 814.320750] kauditd_printk_skb: 11 callbacks suppressed 03:38:35 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x4, 0x0, 0xa000}, 0x4) 03:38:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x8000000}, 0x0) [ 814.320765] audit: type=1804 audit(2000000315.668:410): pid=4981 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/462/file0" dev="sda1" ino=16578 res=1 [ 814.372231] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:35 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x4c00000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:35 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f0000000080)=ANY=[@ANYBLOB="ffe0ffffffffffffffffffff08004500fec300000000002f9078ac14ffbbe000000101000000ca889078cbeb3d7854bed137f9aa5bddaf60794d8bd6f0d6842f54d3e19d41eb5eed4baf410dbbf3694fa99b72c451a5f5a508a32cede157ec36d2a5e99ad0684a49b6a4"], 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) ftruncate(r0, 0x20) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x0, @dev={[], 0xa}, 'rose0\x00'}}) 03:38:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000002e00010300000000faffffff0e000200"], 0x14}}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x10000, 0x800) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x25}}}, [0xda0, 0x7, 0x9, 0x4, 0x1000, 0x5, 0x32, 0x0, 0x80000000, 0x0, 0x5, 0xfffffffffffffffb, 0x1fffffffe000, 0x0, 0x76]}, &(0x7f0000000480)=0x100) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000004c0)={0x0, 0x7}, &(0x7f0000000500)=0x8) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000540)={r2, 0x100000001, 0x6, 0x8000, 0x7, 0x7, 0x2, 0x2, {r3, @in6={{0xa, 0x4e23, 0x100000001, @local, 0x7}}, 0x20, 0x3, 0x4108, 0xffff, 0x400}}, &(0x7f0000000600)=0xb0) setsockopt$inet6_udp_int(r1, 0x11, 0x6f, &(0x7f0000000200)=0x1, 0x4) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000080)='bridge_slave_1\x00') fsetxattr$security_smack_transmute(r1, &(0x7f0000000640)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000680)='TRUE', 0x4, 0x2) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000140)={0x3, 0x8c, "3285618f40a3666b65a53116e6ca1a096e21718ce22a3753524d880d108b2ef1d88a29ca27c93730952e4dd46106db63ad7c9e26905411e5eb4b937d7e85553fdcc766ef317baaa6d4149238f8d23ae3bb8a9f7e96b643f43f4c6816defe2588490845c00548abdde625fc4e839c0e4139aa82fbe0fc698a6b2809bb10e2f0d332f6c72b2ae3fd611e69baf0"}) arch_prctl$ARCH_GET_CPUID(0x1011) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000280)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r4, 0x4, 0x70bd2c, 0x25dfdbfc, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x40) [ 814.423221] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 814.441473] audit: type=1804 audit(2000000315.697:411): pid=4981 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/462/file0" dev="sda1" ino=16578 res=1 03:38:35 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) [ 814.561377] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:38:35 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = socket$caif_stream(0x25, 0x1, 0x5) setsockopt$CAIFSO_LINK_SELECT(r0, 0x116, 0x7f, &(0x7f0000003880)=0x8001, 0x4) 03:38:36 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 814.634402] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) fstat(r0, &(0x7f0000000080)) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:36 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092500096007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x9effffff00000000}, 0x0) 03:38:36 executing program 3: r0 = socket$bt_hidp(0x1f, 0x3, 0x6) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x40, 0x200800) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f0000000040)={0x1, 0x1, [{r1, 0x0, 0xfffffffffffff000, 0x1000000}]}) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="ffe0ffffffffaaaaaaaaaa189181001600000d0100000038020000578463592cc2d8207011ec492e48188c1b65d2a0c8e55b03a0ea7d130f144a6bae2b3b23923672d34cea7e15441f5c89bb11a98da208f2d9dfdb1e623ba01acb0000554cfbd2e4122324822d15e6cf40dcb7e34eff130cbaa8b973a577312d55e3add3ae5d374f54b09e9200384ce9e4d21aef8c4271c983fe7a42d789ddee93c173187b726617deb24ce873859aadb382a70870f0cc21b5b5201c6594a8c6807595d52d74ee3e653f95e355e39eb5384aa64c86b68e2022b3a16b94f4ca72404764e94732b4c60c876cd7e0a1ab67bcb3a2b6efeeb2a71769486d2a0efd72c93a3dced26e0dc791286f0a9d17064e157a7260f419f4a3e7033a3f83044667f54ad4309b155d5ee60cd8dfc009af2e82a570ad0e5c39de78fbd6df1757ed710ff8e9d2000000000000000000000000"], 0x0) bind$netrom(r1, &(0x7f0000000080)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, 0x6}, [@default, @null, @default, @bcast, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) [ 814.796716] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 814.822811] overlayfs: unrecognized mount option "w" or missing value [ 814.835429] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f00000000c0)=0x8) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) [ 814.860823] audit: type=1804 audit(2000000316.203:412): pid=5012 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/463/file0" dev="sda1" ino=17473 res=1 [ 814.900048] audit: type=1804 audit(2000000316.243:413): pid=5012 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/463/file0" dev="sda1" ino=17473 res=1 03:38:36 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xc102000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000180)='/dev/dmmidi#\x00', 0x1000, 0x105101) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000001c0)='reno\x00', 0x5) [ 814.963011] QAT: Invalid ioctl [ 814.970017] QAT: Invalid ioctl [ 814.989634] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x100000000000000}, 0x0) 03:38:36 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:36 executing program 3: syz_emit_ethernet(0x2e, &(0x7f0000000040)={@broadcast=[0xff, 0xe0], @empty, [{[], {0x8100, 0x3b1, 0xadf, 0x2}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) [ 815.058678] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 03:38:36 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:36 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092500091007000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:36 executing program 3: syz_emit_ethernet(0xc5df48aeac08afa1, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) 03:38:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x9, 0x8000) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x1f}}, 0x96, 0x9}, &(0x7f00000000c0)=0x90) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000200)=@sack_info={r2, 0x3e, 0xffffffff}, &(0x7f0000000240)=0xc) vmsplice(r0, &(0x7f0000000600)=[{&(0x7f0000000280)="ffd73cb04a0fec22a94dc267d07c7d646d2a58e5b5eed4c3a216738dacf9e814e0b1465831be827bd0618898bb5261df7d229972d0035a17a67815d73d04c9b24f5a4a6b5515d92ed28698fec44827e36d1bd70187a9d72884cb48feacffc331647dd813d085c914f841d5f5d7bedabdbcf110894387ee74c5ff076a10f959a6556aca604226e9102ff9f6e574fb46fdbd6b9894be4960976b5e5b1ca9c4f512e2bd3641c83f3375c7", 0xa9}, {&(0x7f0000000340)="3ff3d528982ede929a9efb4762420434da21b9c63719d55163b1c2e6f53583e5d488ead78af147dcccbf023b30afea2682f8ecdc160658451a359e8f80b63ea5ed5faa5ced5172fb88abe984ca4cdf4fd8628896e870768329fff45d8a39a57d5d63988b1e3b323910b1614e048132ccdd99553df88bc67a4e583149b19a98925a81f8b04a97db78190864233e015a7a4f5dca3034469ef661afee119cb1c64c7654cba81cc5c19ecdd840903af663d52fc09f723e2d487bcd058be85266995bc1c591f2dbaf6c5debc95a49a02773bc2dac80ec743eede1ec93013da69fdbedca08588f2a7978426ff38c3b63bde9ca16e0", 0xf2}, {&(0x7f0000000000)="f0b4702341da8c6a3c497e5f0d6d95e4378b2015e3dd87fc5df63f1d39a97f7a58608697e0fbe0862d871f76c6cb737d783a95c49038f7754b044fc00840968da58307b3fda9fccf384a99554f93c975", 0x50}, {&(0x7f0000000440)="d28b914923db652a14b21e7f7e59c4ec4387563d9228a51e70417af285ee2b2a5fb9a53f4672ffce5faa033c495c9297a5928a409210916a27a0ea3b0f17d85474412540e569ca4b4655a4ccd987296858587d3154544438585193bf7e0e65582f18f5c8fa9d67bb5829fecb8058760caeb9fbe9ddfd5d3451ac250d9c9613fd69a1c82dffc5f44655aad971a321079d1c6d452bab29c02e0f8e8cfe0f0eb1bee547aaa8b5bc7619f194baa8ea74e5ce5749225fc1fbbbae133ec3d06b27f13c1afa695f57b33bf5", 0xc8}, {&(0x7f0000000100)="d212bc4a5ba5def8d6c9d252cdfdf8f766708be2a40d8555c0e08d989719d06c20dd48d97cbcaea167f06c31784b0705fd01253a42511494155b2a54f35d4a", 0x3f}, {&(0x7f0000000540)="ac896907060158b513cda41eeadbb7ae5ceb5f8b3fceb980975d7f402907b20b5a408fdc22a09a74c958d35649828e2e91385e56a8cdbaef7c371463147d0142675df38912d1a5f6240fb8aaf0b1911d4b83b21441dd487d34a41c9ae0e77b2ff4928e5723758001a01ac41ef0b51c07b29187bd0f07006b10c93bcea7ea1d99631161559beb", 0x86}], 0x6, 0x1) [ 815.259078] overlayfs: unrecognized mount option "w" or missing value [ 815.284910] audit: type=1804 audit(2000000316.620:414): pid=5057 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/464/file0" dev="sda1" ino=17521 res=1 03:38:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) 03:38:36 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 815.310035] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 815.381813] audit: type=1804 audit(2000000316.719:415): pid=5068 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/464/file0" dev="sda1" ino=17521 res=1 03:38:36 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x134, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:36 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='.\x00', 0x0, 0x8) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f00000000c0)=0x4000, 0x4) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000040)=""/128) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) 03:38:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xc00e}, 0x0) 03:38:36 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000280)='/dev/null\x00', 0x7fffe, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0x56, "25d1eb6fb3b001fdb3a2bf42a5e3bcc5f10ffdba0e151a817e1a3525002898fd3c8f807a7ee56ba45e6dce370fc2fb5fbb7a629f715f979a568a497049ea0425da364859ae5755eeb6965d842ba0ff52a4a8b401cbdf"}, &(0x7f00000000c0)=0x5e) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000001c0)={0xb8, 0x1, 0x3, 0x328, r1}, &(0x7f0000000200)=0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:36 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 815.502819] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x34000}, 0x0) 03:38:37 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x02', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:37 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000001200)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffe, 0x381880) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001100)={0xffffffffffffffff, 0x10, &(0x7f00000010c0)={&(0x7f00000000c0)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000011c0)='/dev/dlm_plock\x00', 0x2, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001180)={r0, 0x10, &(0x7f0000001140)={&(0x7f0000000040)=""/69, 0x45, r1}}, 0x10) 03:38:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x54, r1, 0x120, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x40}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_BEARER={0x4}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x8000}, 0xd5) 03:38:37 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:37 executing program 3: syz_emit_ethernet(0x66, &(0x7f0000000000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@generic={0x19, "27cacab2c56f79c920db4339100807f8bde3586276d2aeab1db3a0583ff345e3b03a065d82a8fdddbc95753296420e280e25c5b4f4dccf7a34a6bd85cc709d581fca4db51bc57c612e595c863b15d000b67a96473d2f23f7"}}}, 0x0) 03:38:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 815.836534] overlayfs: unrecognized mount option "w" or missing value [ 815.867409] audit: type=1804 audit(2000000317.205:416): pid=5097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/465/file0" dev="sda1" ino=16577 res=1 03:38:37 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x14c, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = semget(0x3, 0x1, 0x8) semctl$SETVAL(r1, 0x0, 0x10, &(0x7f0000000040)=0xffff) 03:38:37 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:37 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000040)) 03:38:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x400300}, 0x0) [ 815.914367] audit: type=1804 audit(2000000317.205:417): pid=5097 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/465/file0" dev="sda1" ino=16577 res=1 03:38:37 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0xb) write$uinput_user_dev(r2, &(0x7f0000000d00)={'syz0\x00'}, 0x45c) ioctl$FIONREAD(r0, 0x541b, &(0x7f00000000c0)) ioctl$UI_SET_RELBIT(r2, 0x40045566, 0x8) ioctl$UI_SET_EVBIT(r2, 0x40045564, 0xa) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) write$binfmt_elf64(r1, &(0x7f0000000700)={{0x7f, 0x45, 0x4c, 0x46, 0x1000, 0x1f, 0x3, 0x9, 0x4, 0x3, 0x3, 0x0, 0xbf, 0x40, 0x2ca, 0x4, 0x7fffffff, 0x38, 0x2, 0x8001, 0x1, 0xffffffffffffff80}, [{0x2, 0x90d, 0x1e, 0x0, 0x7, 0x5, 0x100000001}], "3e8ae8f42f", [[], [], []]}, 0x37d) ioctl$UI_DEV_DESTROY(r2, 0x5502) sendmsg$TIPC_NL_PEER_REMOVE(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x82}, 0xc, &(0x7f0000000280)={&(0x7f0000000500)=ANY=[@ANYBLOB="def509552fcded80c6282be3db35065775ad7ed09a02e8f3e09d933f0beb456b2d4642972d1aeb37adc2cd4a6f104a6d0000000000000000000000000000", @ANYRES16, @ANYBLOB="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"], 0x1b4}, 0x1, 0x0, 0x0, 0x800}, 0x20004000) 03:38:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000000000000000000000000000000000d3e200"], 0x14}}, 0x0) 03:38:37 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x82', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:37 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xffffff7f00000000}, 0x0) [ 816.159512] input: syz0 as /devices/virtual/input/input35 [ 816.192520] overlayfs: unrecognized mount option "w" or missing value 03:38:37 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092500090b07000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x424, 0x19, 0x301, 0x0, 0x0, {0x7, 0x40000}, [@generic="6a2bd4c2bd6a9e0f067cf47a551d5216e2b778b7d6d46cf75a19490b7f25e29292a8ac00e0894a861c7ec37ce0f3b058ed8af7b28d9a26d8409df102f76c727d45bb56d0087a50e3d52edae1f2b3f0089446ffe27e9fd0a4b22d7bcd04c2adb4c07c0a8217f16520e194e1356df4ea00f015ffc7472d73d7c56c639fd24d3735807312084e016d0e46811f8bd641c3060824ff07cea2933e65c7ddc7aaeafc14e997"]}, 0xb8}}, 0x0) [ 816.238042] audit: type=1804 audit(2000000317.572:418): pid=5133 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/466/file0" dev="sda1" ino=16577 res=1 [ 816.306285] audit: type=1804 audit(2000000317.572:419): pid=5133 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/466/file0" dev="sda1" ino=16577 res=1 03:38:37 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xf403000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x60000000}, 0x0) 03:38:37 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 816.353740] input: syz0 as /devices/virtual/input/input36 03:38:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x38, r1, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xdcc0}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xf4}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x4000000) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xfb0a}, 0x0) 03:38:37 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) getrandom(&(0x7f0000000100)=""/21, 0x15, 0x3) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380)='IPVS\x00') prctl$PR_SVE_GET_VL(0x33, 0xbb63) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40002400}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x84, r1, 0x400, 0xb5, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x48}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x54, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xffffffff80000001}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfff}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1ff}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xbe}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffffffffffffffff08004500fec30000f400002f9078ac14ffbbe000000100000000ca889078"], 0x0) [ 816.447470] net_ratelimit: 20 callbacks suppressed [ 816.447478] protocol 88fb is buggy, dev hsr_slave_0 [ 816.447499] protocol 88fb is buggy, dev hsr_slave_0 [ 816.452508] protocol 88fb is buggy, dev hsr_slave_1 [ 816.457588] protocol 88fb is buggy, dev hsr_slave_1 [ 816.472718] protocol 88fb is buggy, dev hsr_slave_0 [ 816.477870] protocol 88fb is buggy, dev hsr_slave_1 03:38:37 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:37 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:37 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0xa, &(0x7f0000000000)=[{0x8000, 0x0, 0x8, 0xc93}, {0x100000001, 0x400, 0x19d, 0x2}, {0xd35e, 0x8, 0x1, 0x1}, {0x9, 0x6, 0x100000001}, {0x6, 0x33, 0x20, 0x9}, {0x9, 0x3f9, 0x5, 0x4d4f}, {0x19, 0xb638, 0xffffffff, 0x10001}, {0x8, 0x10000, 0xfffffffffffffffd, 0x6}, {0xb353, 0x9, 0xbc, 0xf44c}, {0x9, 0x8, 0x7, 0x100000001}]}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x2e2, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = dup(r0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f0000003280)=""/4096) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_netdev_private(r0, 0x89f5, &(0x7f0000000240)="9a5b4c5546f73be0c59f4ac6826e03e667913bb3638c7c2466a098a2f53e96d46fdba90e12e1ddefdfd8194f3238ab1db563527e83e25e611491263e89a78f469bcd57b8f6e66464ca8d38829442048391f185385101139f43b6834b3da59fac3a4246ecd756c9f965cf0671f02fb127fdd91e10bf5c7bfd278ab3ceaaf5ffd151b48c7cb00d4e676bf292e22272273ce729d85bb3215bd76cbf6024fcfa2218259bd3de7b30a8c88aa255125e7bed06016a06b6969f19fc7a5199314458ee3f77b3d93ef7a6070c34d35fb60d588372a535426220d822b011") r4 = geteuid() r5 = gettid() fcntl$getownex(r0, 0x10, &(0x7f00000030c0)={0x0, 0x0}) r7 = gettid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000003100)=0x0) sendmsg$netlink(r0, &(0x7f0000003240)={&(0x7f0000000140)=@proc={0x10, 0x0, 0x25dfdbfe, 0x10000000}, 0xc, &(0x7f0000003000)=[{&(0x7f0000000340)={0x1024, 0x20, 0x210, 0x3, 0x25dfdbff, "", [@generic="1b984e67011d860db2d202c1d25f10f082648093ccc1cafa192b3f735095be91abb0bb2d7ae7f6368bcd45cd5d2ca437e19b6be7d149e494291044195b03902f1e3bf48d18fbc7741e041d792940331d27bc39d4dd63465cba5849f0e6bce4f9c5cc2a0fe69f9a6a4c7f19dcc5238395bb8d4cde9fad3ba6b03460175f956b6fe382852383dfe90de5845174fc5bf0b4d850d26ff7fb72a0dc6f3e1504bdf4448356773146058653216e8dbe7fb0402dec9dd744dbed2db8fc904a2861c791aafe18864dfcf06f366c1d185ddfd11fc8d22f7f6d326d6327e29b9015b2566a31f4f87cbe8ca86b09f9fd347434741cb3c16b69720d8872597a0aee24d18a08069c66291980a5002b50ef531635b270fe51468db3f5bea13d99dbfe0303fc7e3bfaa28bb27e826861a1a67e1070ee105e08a8af5329c6a5b15ee16e1c9a1570ecb4726444812c963adb214c24dffa4d56b28c3fdaf5a9367bd7aa8041e0cad9d51266530d43b90c546f9c3638d0bed5342cfe7748c44af118ee2edd7af1574ac21e621c93796d04f49d9699c5e2ecceed04268709b47465215ee698f1b8b3df3cf17eef7eaa3a415e773339377ad4c46634b3089e2e1f2397137dea8ae509630fd8e29da8968f7aaa680adeb293545a73cc703fc23425c8cae98e79f0c99e3144c5cd519893ce4042a21243599f55ab7d906fe682bff6ae219f991731ee850e4df81959a8eac062b1512011fa58a5eabf14f5e99bbeb6e8634b29110328499b5d69f4984d9a35d5d49e980bd251cac118400cc366e821c047cdf2f589145be564664c9e26baecd406eceec3366292dfaaf4f54457534d10d8ae53e60270949869ef00f440f87bb6e94eda6c53a1f0bb5b3a92fa1fcf0db32680af0f86cd8e5081e4e72cf22fba807de533fb3ba7968e2b5d8a4aeddc5e012e04e1aff4c8721cec29f9b39f057ce883257c60c131ebd007f82a53cde2f197fcb6c0241ff35fcd89325fc2ee3dc88a70162c5ab0ae699f1f9c25c03c56d2362bdec9213d47ffc43df65293c3a11e32ad4f3b02764cba530a94973d4993056e1db1e028481694992ed308a12c88454ad0902c5796e12fb3faebcf5e359617795e419b4873c1e950e8d79a42e68c2eed54816487f1d448126e8ce962cbbafe5db7702fadbd28bbfcb610bdcb500e532bb94402672afe300ea6cfcfbeabaf2d454f10db1394c06b997b101d0ec4fc547861c7016a1cb5e192eab07db4eaff99b850c44ddd6f4f202cb6fec64578a1386e55cdfebf7f75deed582a933b55b8d46cde5e544f96501882439dc2cecc1a7399dd4f51058eef16c9ce7969d3a9483cf7bf2da6be408c0bc1e36e4b389686ef460699ecf8f5dec893fa88aaa786382fe1789ef3a74c07f82bbd82b9b83aa95ac6d3c1788e042a15ecc8637d5c4837063f9194e72cbb292bf644898415e784d563e550eb17a31cdbfacee2dba6d04cabdc5d4d7ab73da0453e8bdc8878f4c511c1e269204edcc71b5d1d59165c770b55f9d6e2fb54518f068cd73cde81f599fb40ffcab3884d12d3388d26f7408a47bc75ca525b3455b00c7e06c02978a96b11de966f21d56b3aab2aad70fab9cd7be4b7c48bd9059266513efcde48ca4e1fd56e56e8cf1f2e3a11386dc2c22c2d9a627f3c48c387d3db5b4253a4c8baf6418ddb58cd228bb2292fc27738e21922192b4b473136537622887fb8cf6da9cc24ff25459a99f95f314767fb76686a08a43a16c6b5a872c6832e4a78e2b49cd641b8acc7ac9a2e4ee295248948cca69599ab89cbb4716c5676460116c1171d62c4208a650ef4a95ea6fa32ee6fdc51f8d91bd21aa6740a0b02ea652c2ea4cae499d61cf38aa82a66a73f64dbb09dc5cec7fb3ca0ab8b5d95db8b595470eddafe953e034912e571a00be310216e792815fa0718f2e0f3fc9fe2ac020c95c823c8d0918c05f7aaf2168563066ad61e5f0ec0e4702032b89597558a930247b2e046fc6839392912cad9da78bfcbe54014854c7c8dde85968c47ea36c8492a8e123a81c51cc33fafed8504ea0112236373692487dcec33e0b64c1ec2abd29547a71676928d12489b530858b5722f358358a965dc4fe992770949805efd65c2bce10c40138fe3c47528e8a57187740c1d0a55abad970b1cfc307f6765d9c24c1798c0083288d91cbaff5c6d40147a7f95c0669ebbe0b70bcc34366a67dea139a873d8e71f226b069f69e8d496e4edd7d52b03147b4ebae631f4315fd3fde69568d86e298dcffe183a8f88abc853bdd1cc351105d4cf97313fa09bcc012799a58461acea5eed68ddf896187adc7be4e83c987074adefda7fafe8925cc4efe3f24e13242082c7d94080955cb3b3a7ec19a42aec9bf63f1c347e635ae06750fca96635ad808d7c58920ee49f1b23c3ef406a1859f7f6906f1e74049d9283f0c23b9b0cdf7b031d4c0e094cf1f7496f1bcc4e1522fb2d5718eb4d2db95996b1507800d1777ed33338b8b1a6435bb8cbc028eeea7b6fbf50d7a64c480343e7c52c3cc6144ce38706642da7ae59af2adc12a56639b2ec5479b910703022e4ecf9e3e82961e465c3017a51052c667dd1635409a4b01713fde5d8137966ed171e0fc6a273ab6cbcc042fb551580d7c7845c45b33bfe711ab258846f859106ceaddf15d4ef2ef9328f3add8bdb9e4795ffef9775f77c3ac8bc7894dde7039903df09a989b221314690a07983aa158fd2c09f9f80b71dda205c2372649e1671e80c0717d9f3a2bf2a9e3f5102a51f6e3df088be76d17c30b5987f5d4b8eadc64c1d2f59b76432e9eb83fc8719118a8a0198edc7e19aaacdc4ec234f05a3a1a17b8a4bb7cead94118a3467802ab6270832196296918d861ef40bb1b9ce45f991792301f54e3a286c418b83908794d24dee45f9e98fb03038d3c0733a44e3f3cd1c5afc71594c7caf447967c255637888d8561c2f6740d2c6c1b4ad94f25a4facc47b372511ebb1f12aa2e1aa4d3c610b5f9f931be4acc9571953cb5ef78594e73da147a85c4bfc06a4a38c753e6fe1fe46e3285eaa9555cdb5124745a9c01108af73a02840e9d0645aea277f3447d0d830e7cce07eb4b635ac954b87ab78db7462cfa7340859264667ef5b3cacf426c13a3ccad9e40e04a893fa357191a340eb6f658a2e43d77e668fa3015c55e2a727a2c70218954fd4a797da5e7c3602a3e64ef07cdf15f4bfca508bc564d09a0054542376645bf8993008c9519bff8e10076f82160bfdc73b06ab706344c7b3e514b43d13426067931f63d1faa2048c3164d0df0735849c8fac3bf00c824390d5eb168b76c9c06f6e77dd9b91530f831dd21f89a7952f39b8509af4ed6646989daa648f3c5f14fc6720b17b7a87f69640a5f325cbd0e2f9f8adde1fb7f806a6df431119b3ec0e95fde85b1d5c9ce56f92c5ea3fc710880c79bb91b78d994bd5268fda13c8aacdf000e36240c33bf89a35e8f63fae6f542a2072f5ef90a09c2b4fa3f8bf155b7006ca40f9c074cac13efaf56f19519ec813083738cdd7c04c2fead6ea5ffc0025bf1246230738df44597baa07ac718ccbb6811b373754e1264c9176a7ee90fc9733cee02774fd2a03e60ce8615b3b5057feb7c3ce481b53411efd4ef8f8418cdd79f7f09f2bcdaed274793132e496caa793517ea35f5814b38f1633fdbda6e8d02f6a53985f401125e5325075614244775580f9ac441cbc09378c4fec811f3922b557ac5c4caebcab3f2a17ce66858a993d68a8ab340b011bc9e42eeaed0e5a801231cc6d5259fcdcfa73fc9d0e8b0d388b454262c2dfb2ff5ef86a1c076e2e515ad23b703e4b7ff39b82ea0a1139da957ee22b8643ea11785aa59587895b931c1e8239c5c14e872630138d443f6872a76d0d6ee38536b23aa33c40d99778fc331de0be497f1381805d38994a8b883ce9f6246d314b866c271431ab91d38cf04081ec2eb082beff5902c0f4454f239856bd7936cf83b0aa1e2aa846242c351f5e5ca74bbd04b9acf682096db3822684645bdf8694a0872390799c1cf835fd2c1a7b3ae85902db8f1657756423799dbcdd8ffabbde5dc410ac263a8774ecc59e3d108589c2fde01c4b1a3ffbd2028d1c005dbc031dbf90756f9054de55e2a9e5f22d5ccb79a6d70f8e4d2eb40df22293f710be6dbc79d49d8db1e5898713d84b7ca70222def315ef351c3118f3c39d9e670aab6d305da491189145e67a47714dd6fd9e94a601cbe1a8b8ff99ba52593d8c15cb61597db9552e067325a6f82c7708a556688c40211b21cc692780a0a80008add97175d6185f57a7ed13ad1335552de9d987adf4877f065cfd28ea4043e01b60f3e11e40225b2ba9a5b9b35baa939f20fd73f7444e72e91820175f76cafd336793df1995c405dce059f4ccb0834c4476a2038ecc80cb7c0c23a3c86ac1c8e39b967120ade302dba8cd1d52b47634efac6f222fdc88c7f6b80e9be3af3c1d9df5d454d1dd50223a486837f4138f6b95f84e5b2eeb6e63eae8c286c3ecac507843ac002bd2ba8a9ea4802b72b3dbf3c2616356cdfc8bfa82c0025bebca584fa1fda0ae66fbb01e26c16c1e9913fdbf54bfb607b9de1950d042a9144dffd10a8a3ea54ac8b103e6ab8ce6ea86c8adda50bee138b4b27a964fa1021133320565024de7b82b6cf2217a1a37852eefcff95adbe949b0c1560cfad992f724e6edcbd3101560ca9706ffdaacf184b245d35fff9d9ab9a26cc8498b3e37eaf91bcd5101ad8fe1f82df688152559f9aed872fe1b1325dd5f2d174563157aa38054ed6c4268e3d34f1538a7e0aeb8b577555a0149cfca47f4dfad3d049b9c136c754dccf169e33fa5df87a6f29eff33c718ce9b79444192588a8a46a444b51cba1a97f3c7757fe3fcb60effdd8605bbbbc018c6ccb32c06020661d1e11408a4a50f6fb883bd1c42b4910d3820bc477647b1689660268663ab4717fb3865bd3e212730fd1d10c2d4c64a5388e12521fef6f6e5c438e70a1ef0a0c19134d940f4dca85ca4ea0f2c9db2894f0747352b89250c7e810c046fc6ab405b283eab322b49cb8d3604054819a654526e9e40c00c3f9533c3c872a4bb619678aeb7da45acd60c836074cafff3365cc1f74fff64dde22592d6f657161c211a4918557e4cd99a56d87bacf4859bb4788d6fed502827b6b5aa1b561cf091c8d6953f04ded7a2f5ba3675623cb1e888173ad8e7aa554f6e1709ededefdcda83f35170bf12b55ea9921502020c235b281c906627fe3981cc3d67dc6a69790eaf7c828b0b0029ce257d88fc6263254cb4e6093c79af315b581b435f65f2df4b1f3c5903f02f582a2583ce058b347a5741fc695143a19db152b092c5f56b6bf1bf35ad3d71a3abe5eba3465e08e5e735f0ab2a6035b505b3a7b89c1f054e66f99a3d83d2c7499017547d5c1f7eadb3d6c15b5f82e9abcacc3e468be1f6bb0d02f8bfa523b147550d0c10a0be026dbc6d6d647d233a9ec4cb7584e6d31e5502b3a6b0f2119851109710e78a9523de0f4188143cc3328c047bc969503357953d365c0a8488497f484c0ea4817d2b6b7cba28ced570ecf6628ae8c9193513fdf654555160c5171e944f6b3c690a9a7dd1d5087a7c6795180b63371c91311628ea82883f62f37ba2a1b9d6baa9a9454e3cc823e824623ac3b6a123807ed2cc2daa192b61240dd815c29ed1a6e834c84832852ba7e34ba2f0622043f41e474acdc7d3e2cb420e96f8bd57cceaa3593b754f68a7cd348ac4775e67a5046a121134ebea3c517c0c753e59aac217701f", @typed={0x14, 0x50, @ipv6=@mcast1}]}, 0x1024}, {&(0x7f0000001380)={0x41c, 0x12, 0xb00, 0x70bd2b, 0x25dfdbfd, "", [@nested={0x2c4, 0x9, [@typed={0x8, 0x11, @ipv4=@local}, @typed={0x14, 0x61, @ipv6=@mcast1}, @generic="db35a48e69979a93a4bb82e43c7b6f65b84e4656a054389fafe38baf7923c8098c87e2426849f0d027dd51a17c8d4a32a239966c298dff12f02cb11748afc47bfc7674fe126062b199f2f05193d2e6e2f2a5ba0f983d259bc39efa16af5043a3ca586e80d5ffc535df059eb92828411166ac5b59f5e10f7e163231653a0cb72e6531b5da93d524a523b6797d18a25e574e0cb259f621546d28eff072326a0ccf7a899433c60ec3b483fee52959408bee4583e42e00cc7536819fd1458ef6bca699b2c505", @typed={0x8, 0x8, @uid=r2}, @generic="96c3a0f1c15d525b872a9a3985593c9b863439145eaa4e09f989b929f4b731ef4a50ddbe8d427d58388f2b66022e3a5911f02e2049448ef2c0c87f84d6db2fb300aee8454d6a6517e16726263931f694d238960f46a2a7a330d32a", @generic="989883006ab7ac3d9442cec5b72b0ffe17bd7d4048e302", @generic="a329e101d5130d5dff93363e72f222072c15c65eeb5dbc0f0a42efd363d220a97f9ef8cf8cf0d8fcf0fe016b41f008d37429141ea39b4f75758e09de05d36b83912b522b4c7dd16d1ee52d53f57a2b31f5e4adbb6abb8629448a0c493ef0b12f5265ad0cad8851443edd0b5c007da7e7098c9304418f68036301cdfa1f50ac01f653670c7e456a58ae3a3f1e44419a583b314d5636067dda79dd0d6db8943f1e9e95c093f6dc25263fe06faf63c6511c3e844e30875b5d355a5c6112aa787fced5450569c0acf052ca30cc50b164d0366764578f44ada3ecc7bcf4ed", @generic="3e6e794fcd11252465d87b2b4f9e1aeef3ebb61cfcb16a1b8a6e5ca578435a4bc3387fc232beb173e8e64e2393d6b6028e95de6fa5dc0bb79bc6962dc9e32d750744a8852b1739a412af5f7b8f82475dcf22a266025b14d21a6439efd2921f41a950027346c1dd31bc9e038e1ccf318483cb41f0cd27c2f2cf7f7e47deede86a7dc4c7cb90ae10"]}, @generic="81b0a80cdceac7dea3a951d606f7d1193ea2403c051c600f32cda46bedebc1f944104b105281123c020b9572affb45eb835ee441fbba1770de8fa5a542b9d6d19a317a95a784b15008a18f0d807159ed4da3243262ac7b757f0f3c760b408c3627d298934a49c45dcb01ac037372f5c9a04288bf62bcb5e2ce373dc92a093ab068aeb64aa9080e6909b2d4274dc0ab99128f89f9ed23e87da5df10b4e35a65db4b1b33bac0b3835364e6c560f80a84d9146e6cd764a9c256146246810cbfb84aaf", @generic="4945566e6bcebf5c0dcd764b456ec13129ea8da34c0d8519f4ac561acff19c0f26620f6f072d8345d89baffce6e690e2660e28", @generic="c6e13420f163b6bdb9d10fef97938a26b6ed6a1f80d8b054137a2d856a65d7723641af02e7d01ba9e43044d890892451713fbb6260500323161e7cd6133e8e2d571243", @typed={0x4, 0x1e}, @typed={0xc, 0x4f, @u64=0x101}]}, 0x41c}, {&(0x7f00000017c0)={0x17c, 0x18, 0x4, 0x70bd29, 0x25dfdbfe, "", [@generic="d87ff16ecc202f09be87ca59baf7e630256e4447058217bdd5664a8ac7a7a32a9ca9b14d74008b09c1f3504b0a626dcbd6676c1218b4c23d5ec5ab398f88c859cea772514ad5b4a66520d1a89b1127ada4a7f425f987743e9c3228bb87b3cfbd38e0e48173a6f176950ddb201dd643bf49bfef347f1ab2c04735f65aea9a8f3239eb34b8c181fe1f79bd47e5f4a3061b521fd299d0e788907fa0e74617343f19b53def917dcedf533fd75ad8fca80cccd9ce4a14c96721bfed3b0371ed2893fd6b124e71", @typed={0xa8, 0x8a, @binary="552f5c551904139c9872f8c33bcaeaf178c7ae4809d7c12c7f1187f04c550db57ac14fec550e30deeed938e6a8be395ae8d5adef3fb7a008e89e4f31446a538742235a4a2fecb3b8a48eee008285712bd676d5cab0fe1dd71d49386a0ecf3c17b045b9aa2a22a6614e2e2ef456fcc780e17c084c72ac9e4fdb94d5f20ff5feed54c905d11ae4471375f62e24828d5d7ddf5feb6dd2fd5fa9ef22f4e7db30caf1bc82"}]}, 0x17c}, {&(0x7f0000001940)={0x3ac, 0x3b, 0x10a, 0x70bd29, 0x25dfdbfb, "", [@nested={0x268, 0x1c, [@generic="b86961d32c91511a96640bb3e92c9d859f0ed8124bbd08c9144e15700045659ff51a51f3c2f66ae437125bfd6266805d2fc080b0ebe92173e84a6e025956cbab4f98f53d8a3af67652562c", @generic="627e7b9f7e9cb3295799ddd424021dd2c0728cedf7909b58f601fa97bd692a814fc37e3a46edaba217f10c", @typed={0x14, 0x8f, @ipv6=@mcast2}, @generic="e14d6daf366d496f6f37f61cfc7eb501b9a3b1e5a75415c594d109efd2dd5af8d1d0cda0b2ce8965ced42b814f2c53fc87be325b3516b22c49f63fe705771c347df97e3d8544ad04cd30b5d87f7666c4893f72a3d76e1b592c43ada2a6b8167b7450da05617566528b3b10bbff5c97c5939f3c8632a797cd1d69eb", @generic="41fa8d5cf9bd01d0f95d1055f82519c6593397336e71e06d43d8efbd94be63f93fa95bf1901e1ba95f3ed9412741111da57f4851584c00108f69acb468ad6a1f926207b6e84efad1c7a1b8c7d65b217e07d2f71411eb5fa29731dd6d2e30f737ed1cab7fda1a7bcd3e65bb41a565bf17c0e8d2c1db18a9e2c1ea4c955f22a37bcf2bfefc11adbdd2c172c59471a1e89f51ca3f1d1758a0ae35f7b8790eb7487b903df206f8be9a221564b2e9e039cdc1b693de7a8e07fa9aa436550d8bcc8a37cba32ecb2886e3773a0c7778e3f29faa050a35007eef685bba83cf7d2fd2af9dc09e2f970faeba87b3d50356665304f4", @generic="cb4ca28643f26e9efee8af0adaf16cb7a3953a7386709c9e384e32418ae6701f10ea573be12fe5cbe35357ce08e94e1a736439639df0d5381d63c0cb1c7b3f3956f199b897cd2f3d7b8bc29b78ea99813efb368b0085870390f3a448008c1eb329a6919ab33a2975e4592776b7e313"]}, @generic="ae70ffb17043282b36f90c85038dacc43fba70e790587e38104af6291ce535275b75d9a3419b387f80968bc63e2e5753dc580c6bb7af4fce67183bf57e94134979", @nested={0xf0, 0x42, [@generic="10d9b931270f0df44d41d63bc85874fc09fbdecb79d4eb2300afa3bd96437f11dce6a619f9e7b47905c4ead17126e758a3afb55db1cb2abac6992b51659e79", @typed={0x8, 0x8, @uid=r4}, @typed={0x4, 0x16}, @typed={0x8, 0x76, @str='\x00'}, @typed={0xc, 0x4d, @u64}, @typed={0xc, 0x2, @u64=0x5}, @typed={0x80, 0x59, @binary="e297f08f145c530f1ee9586b4d378a1f323d7e39bec52ddd22cda3f1eebe089589fb1a7bade7a76194104b7f6e0972eecfea7b46f452211bb4d7a02ed7e78e3039b6e1f41ecae0e91aafc1d180bf4a2def75726d3e81286c05424ff603e5ea9f29eecef416a64dae1fae237e86aaf0e6200eec92a5fea91b6f"}]}]}, 0x3ac}, {&(0x7f0000001d00)={0xa4, 0x37, 0x102, 0x70bd26, 0x25dfdbfb, "", [@typed={0x8, 0x27, @u32=0x3}, @generic="a479da6cac49eba7ad89223b660570fc506493a983a3c87de2a7e1a291803a9f17d81833ff31874713fae8f2cb33a44566991545fdcecd960a6fa70106445470e2418b322a3377d1beffae69f464e88eb5ca556cb57a45536a708ed4fc0a9d3cd0c45b53fa737f39c4fd5f2707bbdbb6e396028d885653fd4265119ff421cef839b44ebf6bdb402100"]}, 0xa4}, {&(0x7f0000001dc0)={0x54, 0x2b, 0x100, 0x70bd2d, 0x25dfdbfd, "", [@nested={0x44, 0x64, [@generic="e6b88377b649ec3d5d435bc21889f7b069740c28f18d46dfeaa82eea2c47a1f89aa84101e9492407d7ad20a8ca3393cdd3546fa8ccdf90", @generic, @typed={0x8, 0x63, @ipv4=@loopback}]}]}, 0x54}, {&(0x7f0000001e40)={0x18, 0x17, 0x200, 0x70bd26, 0x25dfdbfe, "", [@typed={0x8, 0x2c, @u32=0x4ee2fe27}]}, 0x18}, {&(0x7f0000001e80)={0x18, 0x38, 0x10b, 0x70bd2c, 0x25dfdbfe, "", [@typed={0x8, 0x32, @pid=r5}]}, 0x18}, {&(0x7f0000001ec0)={0x1114, 0x2f, 0x334, 0x70bd26, 0x25dfdbfd, "", [@generic="c3cf52d68bd9a03d89cbde20994a5f6809534afa95cb5f51e063b978d5a00b6e8c905be9a5950e484aac9304e7d434b528a4f57c9b1195439c08039439c7", @typed={0x8, 0x63, @uid=r2}, @generic="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", @generic="c2fa4725eba3cd29c47bf52a7dec986ea247242eec7cfb40045183d403d3d92033d4a8b47c213b4a5f92816936fb12db6ba59f416a832025255a9c4080c4190da9e30317531747add563ba20e0fb13086ae3a2b0173732e8fbf741a331f6c884191dda1ec5776f1d16da4c18a3a562d3f9a2d931f01f9d340990059fec", @generic="1e864f17f74052dd910f17456a404da96b120fb4a5c03cf1f2037ee9f67e82cfdd3cd1f6031ac07febeafedd249638268bb47afb5c7f8bcb240e969959c691f3b2"]}, 0x1114}], 0x9, &(0x7f0000003140)=[@cred={0x20, 0x1, 0x2, r6, r2, r3}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x28, 0x1, 0x1, [r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r7, r2, r3}, @cred={0x20, 0x1, 0x2, r8, r2, r3}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}], 0xd0, 0x4040000}, 0x8000) 03:38:37 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x2}, 0x0) [ 816.614328] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:38 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:38 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) [ 816.696736] overlayfs: unrecognized mount option "w" or missing value [ 816.761312] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:38 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) 03:38:38 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffff08004500fec300000000002f9078ac14ffbbe000000100000000ca889078000000000000"], 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000040)={0x7}) 03:38:38 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092500090507000aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:38 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:38 executing program 4: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_S390_UCAS_UNMAP(r0, 0x4018ae51, &(0x7f00000000c0)={0x5, 0x27c08000, 0x9}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video1\x00', 0x2, 0x0) 03:38:38 executing program 3: r0 = semget(0x0, 0x7, 0x80) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/192) syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ff00c30c000000002f9078ac14ffbbe040000100000000ca780000"], 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm_plock\x00', 0x400000, 0x0) ioctl$TIOCEXCL(r1, 0x540c) syz_emit_ethernet(0x106, &(0x7f00000000c0)={@empty, @local, [{[], {0x8100, 0x10001, 0x3, 0x1}}], {@mpls_uc={0x8847, {[{0x80000001, 0xfff, 0x5, 0x7}, {0xffff, 0x1ff, 0x401, 0xbc6}], @generic="63defff828f379baaf941079cd224a95e8275dfb4d7d71f4502ad743cb505ea973d65ed9b89e1abcf49949f58f8c84f41192e940191caa106e956097870d8aa093e680d8a9da944404448883797a3daa1ff1fcbe3432dfbf12274ac0186a5c18e430b0ac511d1218a40c1c64a1223d07ffd7b6aa48add2bdc2bec843f68c1f8c37a9626db920652b72cb22d1956ec76349fccf3381021edc894635cf1c65721149483ec52690affbd9207b5896ba5ee87ac4d664e8b92fa331853bdfe84fd114f77dbdcf930f9c356c6e8f1f28e0a618cb30d04ea20c40321950a8c643b43a852362f72e0677aa75620a3c9b"}}}}, &(0x7f0000000200)={0x1, 0x4, [0xfe82, 0x58a, 0xcac, 0x47d]}) 03:38:38 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf00000000000000}, 0x0) [ 817.048708] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:38 executing program 3: syz_emit_ethernet(0xf6, &(0x7f0000000140)={@broadcast=[0xff, 0xe0], @broadcast, [], {@llc_tr={0x11, {@llc={0x0, 0xdc, "8f", "d1c680637f689911bdb13eddc8fec7f014279e3896a5e3f19575ae028a7711a461726815bb4c43bed1d9503a3a7ed6431dfc014de646c70bbcba2b8345e947ed744c48518b2e52205d0d384b43d43d3ed4cc74a25d818f78e2e155fcc7e0ced6f827ba196a41ffb6ea2489deff5c15a855de6f667b4fc7b2d91092e2c810385fc36a6adf22d0fc234186d5c748ff61fe1e5f1716a8559da9746eed1c47f217eed23089f53a8142ef8e1548c25bae407c9776a72b219414191c12fa9b85bf0154a7c48f3660ae36948dc4eee055722a522899f31f2c29e7e42821d22f9700732b9e7352b52b"}}}}}, 0x0) [ 817.092854] protocol 88fb is buggy, dev hsr_slave_0 [ 817.097970] protocol 88fb is buggy, dev hsr_slave_1 03:38:38 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="740000002e00010300000000000000000e000000"], 0x1}, 0x1, 0x0, 0x0, 0x4}, 0x0) [ 817.139372] overlayfs: unrecognized mount option "w" or missing value [ 817.173194] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 817.183562] protocol 88fb is buggy, dev hsr_slave_0 [ 817.188744] protocol 88fb is buggy, dev hsr_slave_1 03:38:38 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xde03, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 03:38:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000180)={0x4, 0x6, 0x0, [{0x5, 0x74dda9a, 0x8, 0xffffffff, 0x7fff, 0x84fd, 0xfffffffffffffff8}, {0x1, 0x80000000, 0x4, 0x7, 0x8, 0x3, 0x37f432fc}, {0xfffffffffffffffb, 0xffff, 0x800, 0x1, 0x1, 0x1, 0x800}, {0x0, 0x5, 0x1, 0x2, 0x7ff, 0x1, 0xfffffffffffffaf1}, {0x200, 0xb499, 0xffffffffffffdbc4, 0x3, 0x7, 0x7, 0x5}, {0x0, 0x81, 0x6, 0xde9a, 0x2, 0x8000, 0x100000000}]}) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000140)=0x4) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:38 executing program 3: r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x141000) write(r0, &(0x7f00000014c0)="c9ad56303448d6ccf48feb8578cecd3f4b0cf60aa4142dcb72923ae2ff1fcf12d2501405baeff968634ae552c14323ef0b7741c2a8ae596a9dc1cab5f1721e02c8eb42920e684d75e9826a3f5dab0e8187693eb497fad2f4681fbaf916cd7f514ec3fdfd5d1fb7a5b724f7c63c8ed34aed3888d096b76bd1d7cf9bafdd7349eea8ce7285500e20fa0a8560fb6a8e25ab73d58313b23d5833439fd9fde510f517be96cbccc7bdf0a81ba70348373f78fd437fbe05f2663986b45ad1c59a72461e4b879e2a7a94475a0fe39b87228e5b49d4a26b5b68b203483c4c2c4a51066279dbb3c2a243182c0aa79985b126", 0xed) syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffff06ffffffffff08004500fec300000000002f9078ac14ffbbe000000100000000ca889078"], 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000001740)=@isdn, &(0x7f0000000080)=0x80, 0x80800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001640)={{{@in=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6}}, &(0x7f00000015c0)=0x6d) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file0\x00', 0x2, 0x4, &(0x7f0000001440)=[{&(0x7f0000000180)="080e0441a89515e3483f266a51a01eb1b84e32e7dfa4444850bb21bb48c7b681c37d853dbd65e08d5a0d4a1667c2b4a3f8d1ab16eb5d72d8d512c4a5c411702446df500a6464d6304bd7401df9f39b4d103710210324b85cf6cdc06765204a6c4b7d96089fb476891b0f6ad6f66d6472fec2db3b6be5be60c376ed0b2800d9d592f0093c92ab3259fe4f4d02e6c4c60b12b5ad59121035e58774ac5af47b4378df351134ae34bdb52e9247dba19d2774b9b221d38747354f1fe9f5b961049d52", 0xc0, 0x4}, {&(0x7f0000000240)="345503d13a4fdd1e482dde51d304f022e2768b616e64da812f9fb64b6c5b34b6b13bff299939c67b8ce2a3a41452cbbdf24dee06e1d6e3b6dcdb9964ba512aa0e1976b477c94cb1ec929a11fc1f2e672dde110303a92f0d8b5579b40c85d8ea7cfbf6160822db0dc72ce073b56170e9f1a0c3051681369109aeac0dd67d016e1b8c21cff39f10c63fb5399ffae179caf1a05891515e96e96f9cfa0aff20258207f3dc4a4b98e203ab5ad4a34802d289276e531b8bfb565d3dfc2c674b54cfdc78771fbd5b07593e0fba68e144ac368737b", 0xd1, 0x3}, {&(0x7f0000000340)="6e61af5e21c8ff2c7cd89f627e8b7d707dfa21249f4af6f618646e0fdf5148c84908cdcb3de581e2bb0f213e9d7df03bfd0174478c109f2e27a68056f9d443fc4b7215c279f4d61fbae3eab7ffe1b68face26fca0eed753a706ebd5e3dc25773146959da9972b5a614ff0c03caaa99760bf7c6cb8a57777fc3565c989bdd7b7462eeaa066250f2c65ce611f172f780d1c58582a2945501422103add50f203b05c2e65c5c14772d41a9e15e23891aa66f6f56c6bb45f3da1f8b1a6ceb49f43bcd6b0a58daa8432d80f85a2bf367b608204e4802888f9747a0713b", 0xda, 0x5}, {&(0x7f0000000440)="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", 0x1000, 0x401}], 0x800, &(0x7f0000001600)={[{@tails_on='tails=on'}, {@tails_off='tails=off'}], [{@fowner_eq={'fowner', 0x3d, r2}}]}) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f00000000c0)=0x32, 0x4) 03:38:38 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:38 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) shmget(0x3, 0x4000, 0x100, &(0x7f0000ffc000/0x4000)=nil) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) kcmp(r1, r2, 0x5, r0, r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f00000000c0)=0x4, 0x4) sendmsg$nl_generic(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x70bd27, 0x103fffffffffd, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) 03:38:38 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 817.474369] REISERFS warning (device loop3): super-6502 reiserfs_getopt: unknown mount option "fowner=00000000000000000000" [ 817.487051] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xfb0a0000}, 0x0) 03:38:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = dup2(r0, r0) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f0000000080)={0x1, 0x2}) 03:38:38 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 817.652445] overlayfs: unrecognized mount option "w" or missing value 03:38:39 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x33e, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:39 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:39 executing program 3: syz_emit_ethernet(0x3d, &(0x7f0000000040)={@local, @broadcast, [{[{0x9100, 0x14, 0x200, 0x1}], {0x8100, 0x1cf1, 0x2, 0x1}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 03:38:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf000000}, 0x0) 03:38:39 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x40, 0x0) ioctl$VHOST_SET_VRING_NUM(r1, 0x4008af10, &(0x7f00000000c0)={0x3, 0x7}) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) 03:38:39 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf}, 0x0) 03:38:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000002e00010300a9b2c4af46342dcafea481a4bc85e8874c7d5ddee6b88d6f0000000000000000000000"], 0x14}}, 0x0) getsockopt$sock_buf(r0, 0x1, 0x0, &(0x7f0000000080)=""/97, &(0x7f0000000140)=0x61) 03:38:39 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffffff7fffffff0200000000fec300002f9078ac14ffbbe0000001d9f1b6f569ed2d60000000"], 0x0) [ 817.883279] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xc00e000000000000}, 0x0) 03:38:39 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 818.025086] overlayfs: unrecognized mount option "w" or missing value 03:38:39 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x82030000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:39 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:39 executing program 4: r0 = memfd_create(&(0x7f0000000240)='em0\x00', 0x4) pwrite64(r0, &(0x7f0000000140)="f5ba4d65038550c5a294492dffacf18885f258460e7e90d59e6000d6cba85c8b17371c2db435c0a579d3cc36be46a1a43e6b43353b475b5c6d160a247635631a3f9e6ed2a49d9d815191627f5734df2786e8c3033c48ed62e9bad246b0c600450ebecf2db1ec800beac1936d99f998e8c099854e0a630b3b3a1921363a8228fc00f7c0ed78b44b52992372c0f1054704bc3c40c2169e", 0x96, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x880c0, 0x20) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f0000000200)) 03:38:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xe000000}, 0x0) 03:38:39 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:39 executing program 3: syz_emit_ethernet(0xf4, &(0x7f0000000300)={@broadcast=[0xff, 0xe0], @broadcast, [], {@mpls_mc={0x8848, {[{0x0, 0x66, 0x80000000, 0x400}, {0x58, 0x1ff, 0x4, 0x2}], @llc={@snap={0x0, 0xaa, "b678", "a47e78", 0x0, "a234c2334bf80627f634300042e9d4e007f2d0352acf1c490bf577f21b227cbc6d137f4d71ba2a3ff6b97b3b9025e0fe56106cdac012f917da612896c503b80cbb6e1f9c43fa1b40ff24aa425d358bf3ce07d0d8d1f1600e3e17cacb0e371ea195b734f1081ba3f73021caab41bf4ab746646cf72418a10e6757a6b21beef7e8ac880e91b78a47a800c3895880a640f3d2bd0213ca2b5de5ec340238b69bd9c257767bd8bed7b363f1f263e463f2194f61239b5a3667836a96f6d16b0b36094bee5422cfdc3bca4b5a634513885e21ebe52de2248f"}}}}}}, 0x0) [ 818.217212] __nla_parse: 22 callbacks suppressed [ 818.217249] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xa000000}, 0x0) 03:38:39 executing program 3: r0 = socket(0x14, 0x1, 0x8) getsockopt$inet6_dccp_buf(r0, 0x21, 0xf, &(0x7f0000000000)=""/210, &(0x7f0000000100)=0xd2) syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ba05c89affffffffbaf305a0ca4008b000000000002fca8451e90b658890030000000000aa340024"], 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x8, 0x20a000) ioctl$TUNSETLINK(r1, 0x400454cd, 0x313) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e23, 0x1f, @empty, 0xffffffffffff7fff}}, 0x7fffffff, 0x3, 0x9, 0xfffffffffffffffd, 0x35ff}, &(0x7f00000004c0)=0x98) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000500)=@assoc_value={r3, 0x5}, &(0x7f0000000540)=0x8) r4 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x8000) getpeername$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) recvfrom$packet(r4, &(0x7f00000002c0)=""/107, 0x6b, 0x2, &(0x7f00000003c0)={0x11, 0x2, r5, 0x1, 0x1, 0x6, @broadcast}, 0x14) ioctl$sock_bt_bnep_BNEPCONNDEL(r4, 0x400442c9, &(0x7f0000000280)={0x884, @random="5ef29ccf2d52"}) 03:38:39 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 818.280499] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x0, 0x70bd2b, 0x25dfdbfd, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}, @FOU_ATTR_AF={0x8, 0x2, 0x2}]}, 0x34}}, 0x11) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) [ 818.374538] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 818.410377] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:38:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xf000}, 0x0) 03:38:39 executing program 3: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x6, 0x100) write$P9_RSTATFS(r0, &(0x7f0000000080)={0x43, 0x9, 0x2, {0x8, 0x7fff, 0x10000, 0x2, 0x2, 0x6, 0x5, 0x7fff, 0x1}}, 0x43) ioctl$VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000040)={0xa0a}) syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffefffffffff0ea6335902c45cfcffffff08004500fec300000000002f9078ac14ffbbe000000100"], 0x0) accept$alg(r0, 0x0, 0x0) getsockopt$inet_opts(r0, 0x0, 0xd, &(0x7f0000000100)=""/123, &(0x7f0000000180)=0x7b) [ 818.425867] overlayfs: unrecognized mount option "w" or missing value [ 818.447006] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:39 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xd8010000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:39 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x7fff, 0x40000) ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f00000000c0)={0x6, 0x0, 0xcb, 0xfff, 0x964, 0x6}) 03:38:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xafb}, 0x0) 03:38:39 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x04', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:39 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000080)={'teql0\x00', 0x0}) syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="b94da68f8c6a804f6fde4136ff019bf2b8b338f878b9b9a8b4ff001801f8ff7f000000000000003f000000a2c5569f06642578c9c17d300b7c186a284375332159ae84c092c58f867825415b27c6fb936e3f77255a9bac665ec1d4402aac0d19544bcd152b2fd998675c978446d953b6a9a8eadbf689bb4e00ae5d70c8d0b3de941b"], &(0x7f0000000040)='GPL\x00', 0xffffffffffffffff, 0x0, 0x0, 0x41100, 0x1, [], r0, 0x5}, 0x48) 03:38:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x8}, 0x0) [ 818.637900] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:40 executing program 4: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x104) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e23, @multicast1}}, 0xffe0000000, 0x62, 0xfffffffffffffeff, 0x3, 0x4}, &(0x7f00000000c0)=0x98) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={r1, 0x6, 0x2}, &(0x7f0000000240)=0x8) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:40 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab0925000900070a0aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:40 executing program 3: syz_emit_ethernet(0x2a, &(0x7f000000a000)={@random="fd014accbf03", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x50, "88ee70e9631d57d25f4470ca34c39983417a6e79a3c353c280adcdd0cdbe6833185f54514c8c51fe8ca68dbdfa79a8bafc3acd1f5180683d808b381b9d016709c7abcca792b4b3b8a357d1a0dd833ead"}, &(0x7f0000000280)=0x58) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000002c0)={r1, @in={{0x2, 0x4e22, @broadcast}}}, 0x84) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x442000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r3, 0x400, 0x70bd29, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x2}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24000004}, 0x4000) socket$isdn_base(0x22, 0x3, 0x0) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)=0xfff, 0x4) 03:38:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x400000000000000}, 0x0) [ 818.813001] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 818.845525] overlayfs: unrecognized mount option "w" or missing value 03:38:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x204000, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000140)=0x4) 03:38:40 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x3402, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:40 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:40 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) 03:38:40 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ff0fb74656ffffffffffffb403000000000000000000002f9078ac14ffbbf200000100000000ca889078"], 0x0) 03:38:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="1400010300000000000000000e000000"], 0x14}}, 0x0) [ 819.018541] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 819.067137] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. [ 819.082038] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:40 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x8000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x7ff, 0x1}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={r1, @in6={{0xa, 0x4e22, 0xff, @dev={0xfe, 0x80, [], 0x28}, 0x7}}, 0x4, 0x80000001}, &(0x7f0000000180)=0x90) syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) 03:38:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="140000001f00011700000000000000000e000000"], 0x1}, 0x1, 0x0, 0x0, 0x3}, 0x0) 03:38:40 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x3f00}, 0x0) [ 819.209968] overlayfs: unrecognized mount option "w" or missing value 03:38:40 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 819.265129] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:40 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x1400, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:40 executing program 3: syz_emit_ethernet(0x32, &(0x7f0000000000)={@dev={[], 0x10}, @broadcast, [{[{0x9100, 0xcc, 0x9, 0x3}], {0x8100, 0x6419, 0x9, 0x3}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0x8}}}}}, 0x0) 03:38:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xec0}, 0x0) 03:38:40 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="14000000e5ff000300000000000000000e0000800e3b6758f7a9451eed0a8297bd7f10add89512af7f3d5ece2a36aeef"], 0x14}}, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) [ 819.380288] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:40 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200000, 0x0) ioctl$VHOST_SET_FEATURES(r0, 0x4008af00, &(0x7f0000000040)=0x200000000) [ 819.508722] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 819.534002] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:40 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x401, 0x40000) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x401000}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x11c, r1, 0x200, 0x70bd2a, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x80000001}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x30}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffffff9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7fffffff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5bb}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xff}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x912}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x80}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xe9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x24b}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x20004010}, 0x20008000) socket$nl_generic(0x10, 0x3, 0x10) prctl$PR_MCE_KILL_GET(0x22) [ 819.580459] overlayfs: unrecognized mount option "w" or missing value [ 819.608972] kauditd_printk_skb: 14 callbacks suppressed 03:38:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x800000000000000}, 0x0) [ 819.608986] audit: type=1804 audit(2000000320.914:434): pid=5448 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/474/file0" dev="sda1" ino=16552 res=1 03:38:40 executing program 3: mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x28802, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x6, 0x5, 0xf9}}, 0x30) syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0ffffffffffffffffffff08004500fec308000000002f9078ac14ffbbe000000100000000ca889078"], 0x0) 03:38:41 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092500090007050aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r1, 0x4020565b, &(0x7f00000000c0)={0x8000000, 0x401, 0x2}) [ 819.660589] audit: type=1804 audit(2000000320.963:435): pid=5454 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/474/file0" dev="sda1" ino=16552 res=1 03:38:41 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x10000000}, 0x0) 03:38:41 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x40000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) [ 819.776419] netlink: 180 bytes leftover after parsing attributes in process `syz-executor5'. 03:38:41 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f0000000040)=ANY=[@ANYBLOB="ffe0ffffffffffffffffffff08004500fec300000000162f9078ac14ffbbe000000100000000ca889078211bb91d000351c0cb73be18e060c67bbc02a666c31f40dff12e5ae0a361388c6e0e49ca605abf265faabd2a3f5eb0"], 0x0) r0 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x6, 0x67eaee8704a1fe41) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000180)={0x1b8, r1, 0x8, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x120, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x37cf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffc00}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8c4e}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2d0}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3d13}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}]}, 0x1b8}}, 0x4) syz_extract_tcp_res(&(0x7f0000000000), 0xb5ea, 0x1000) 03:38:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00'], 0x14}}, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x0, {0x5, 0x40, "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", 0x98, 0x4, 0x0, 0x7fffffff, 0x4, 0x3, 0x7fff}, r2}}, 0x128) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000002c0)={0x14, 0x88, 0xfa00, {r2, 0x1c, 0x0, @in6={0xa, 0x4e21, 0x9, @mcast2, 0x1}}}, 0x90) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000004c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000480)=0xed, r2, 0x0, 0x0, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r1, &(0x7f00000003c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000380)=0x3f, r2, 0x0, 0x0, 0x1}}, 0x20) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000440)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) 03:38:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x6000}, 0x0) 03:38:41 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092500090007680aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 819.939703] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xa00}, 0x0) 03:38:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000002e00010300000000000000000e0000004374b1075b5f71cf6c9b5379603cc271c8aab8e0ddded43070d62b5516e3d0c9f93f81ddbafb577f42b7f96c126b452d97708dd2e73396ca56657694801b9177bf980df7142a50a0b0463c71f03351a07a985d5fab97950c2ff294eba4185232d5d843501ed0065a50ae7b9291eddb412266c3e1ee01c345b0b9ba0d3672c8caeb119c5e63a8ff949e389562a7c357e8240ad7dc74a05e09373172a571fef7"], 0x14}}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x101000, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), &(0x7f00000000c0)=0x4) 03:38:41 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 820.018100] overlayfs: unrecognized mount option "w" or missing value 03:38:41 executing program 3: syz_emit_ethernet(0x9f4834b, &(0x7f0000000340)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [], {@canfd={0xd, {{0x1, 0x7fffffff, 0x4, 0x3ff}, 0x3c, 0x1, 0x0, 0x0, "a4756a108d39bcc9d8d8cb6abcdc909c142e00efbdf9acdd491a32037831c2033e223f6ba9d13be08fee58bfae4832cc3db72983c9db39f09bd62f69df99603d"}}}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000240)={0xffffffffffffff9c}) write$nbd(r1, &(0x7f0000000280)={0x67446698, 0x0, 0x2, 0x4, 0x4, "b06400c30708c267dea464e4bd87"}, 0x1e) get_robust_list(r0, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000140)={&(0x7f0000000100)}}, &(0x7f0000000200)=0x18) [ 820.063991] audit: type=1804 audit(2000000321.360:436): pid=5479 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/475/file0" dev="sda1" ino=16557 res=1 [ 820.112555] REISERFS warning (device loop0): reiserfs_fill_super: Cannot allocate commit workqueue 03:38:41 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x34020000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) [ 820.155439] audit: type=1804 audit(2000000321.360:437): pid=5479 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/475/file0" dev="sda1" ino=16557 res=1 03:38:41 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0xfffffffffffff000}, 0x0) 03:38:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x80000000, 0x40000) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000000c0)=0xffffffff, &(0x7f0000000140)=0x2) syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x0, 0x2) 03:38:41 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:41 executing program 3: syz_emit_ethernet(0x2, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRESOCT], 0x0) 03:38:41 executing program 3: syz_emit_ethernet(0x1401, &(0x7f0000001480)={@empty, @dev={[], 0x2a}, [], {@ipv6={0x86dd, {0x7, 0x6, "4cd7bb", 0x13cb, 0xb7, 0x5, @loopback, @local, {[@hopopts={0x3e, 0x18, [], [@hao={0xc9, 0x10, @ipv4={[], [], @remote}}, @jumbo={0xc2, 0x4, 0x4}, @generic={0x1, 0xa3, "7b9a8c415a87dac66f51c6c69145a81fea6f3dd1432a84f5f8bcec0029ecbe7b50be5a8c58f12c4098c112815195b6415506816cd6a86670765bbe4b78ecbc866d934deb552d1e116acd596eff86404a7efdcd6c6ff0ce0cc080f10e4baab6ff3e3e2294055bfcec9eb1a7f20f06b68bc24eaab084a1cb693d64b2a57bca747d0ec9053398d5dee436121d93904ff439f200272513e4e59872235a102291ec1f39d44b"}, @enc_lim, @padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, @hopopts={0x2f, 0x1d, [], [@hao={0xc9, 0x10, @mcast1}, @hao={0xc9, 0x10, @mcast2}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x28, {0x7, 0x8, 0x5, 0x3f, [0x4, 0x2, 0x1, 0x3]}}, @calipso={0x7, 0x50, {0x80000000, 0x12, 0x1f, 0x800, [0x5, 0x1, 0x6, 0x1a2, 0x101, 0x8, 0x4, 0x1, 0x7f]}}, @ra={0x5, 0x2, 0x602}, @pad1, @pad1, @calipso={0x7, 0x38, {0x9, 0xc, 0x1, 0x10001, [0x100000001, 0x1, 0x364, 0xfffffffffffffffe, 0x7ff, 0x5]}}]}], @gre={{0x0, 0x0, 0x1, 0x4, 0x0, 0x20, 0x0, 0x1, 0x880b, 0xc9, 0x3, [0xfffffffffffffffe, 0x6], "c00da3b16f2e2a686a569ba78c0eed387b77aa71cf9ce2c06ba5c6cca2437ba5a64c8fe0d8fb33efa56309da796af5a94f38d49db060106be780749ab6c9930f68286d2429405313f4dcb38f36ae959c0c7df7679b69d848ae2cceaaf7cc352030979b6fb9d1ae52d12bff6502a76daa1966eb9a0c5fe5800feea356c664a830f7966fd4d0011ec633a163f3a23582fa33426e56c18d99f7bc372a83abda0daf0e793a5b8a3e01f209b603dec82e3cc758e4c06eddbe86cb4b119855efe85b34c5c73b77f30c5143ec"}, {0xbda, 0x0, 0x100000001, 0x2, 0x0, 0x0, 0x800, [0x2], "27264da7c5b85f8f74da4af224dfe13ec55176ba1d6f6db07a7204ee70039968109eed3e81373093b6f20a6357b0b7f500a664c3f180bf1eabaca229f8e4959eecee06301b14cf7df1125a198e98a8c4b7b65c3a46faba30efe207a8e6dae5775cf9548ebeacba21e6beb2bd4bceef0b54c71ecc1c4f5aca7f9f0139e632376876ba5b1a40e5a2bd2c3b98af2b640bfe15cdae8d4d61fe460b1eff8c28ba518fb1d80ef51c81766c2f2878a15d0b9f8328f054449c154726de42396c20eab0e64f39c55e0c10b7"}, {0x0, 0x0, 0x1ff, 0x4, 0x0, 0x0, 0x86dd, [0x1, 0x0], "cd0444a9e97d35701c9eb0daa35954fc141e451d5e0714ea05899386802c4afa7d98a3e5bf"}, {0x8, 0x88be, 0x4, {{0x101, 0x1, 0x0, 0xeebf, 0xad06, 0x1, 0x0, 0xfffffffffffffffc}, 0x1, 0xff}}, {0x8, 0x22eb, 0x1, {{0x9, 0x2, 0x2, 0x8, 0x0, 0x7ff, 0x1000, 0x2}, 0x2, 0x8000, 0x1ff, 0x9e8, 0x10001, 0xfffffffffffffff9, 0xffffffffffffb8fd, 0x1, 0x6, 0x8}}, {0x8, 0x6558, 0x1, "4fe5986a82d1098a644e886f058769f7e0cade41356d74c8f14d1a9498b00a23d96e78e701bdf72ddeb7d42f3654bfe470d37b9d7b495bbd64fc49cd1237a2a31d95d45a9ae59e5c14d6d3310a4e13334c3f4399194d96464a7829551bda51e68052a94a6cffbcd6f4d6eed8947454da0f42aa8ddd71e08e482f1c55e156a6d77c185271f4a66bcd5f28777fba5a3d93710f818875afd488b6e9b0ea1283cd69358384ab21a60006328f33c48ac5503b1180169c48a329b60ef0c9e3415b5c5908774a19bf56305cdc60662aabd000ceb4ca8ff1cab133042a96ecfb9b03269e507752e1bb3a0990a314c928ccb5a2655d085023f4bcbd9a9c1818a60dcc7e425ade136b74d395c30deb30eca47b6df643568e7e4467496583b8dd471bc0a950b69387290f2479c98f101936e4f37b89c2dba75f1a38256ee83ad11414d811eb1f0883a6028647708b1389972f107dadc21d22fc14ec75503523cbf0b380ba425bc4e1a1a5b9d1be369ebdc66b62003029b9beca351de60c0fb934fae84c167d5ddf87d3b7043a6d1e449201265974d7a82f458df6ebcea794314d4583fe042710a6809e26258a78e20ae5c40857a02b704a6d8934b42c81337d8ab15d2dab103ac450d86e5db0fd4826d12d8162d496e34c2f292ca8f4eaf69d94f51b2da9b96154e40a008b2ca5c108562cdc27ef7e732f82306f7b1f6dec84bb88841fa6333596136e8583a460bdbaa11473f2faab9a4fbd875d0b5e7f6e1a26923bf9be3397c41da54938f3f214fd1bb0da031e163f409e0a3e9f2228cfc65c10ba9ea4e2b1eeecce7ec9e637567332ce15641f95e5fce4ae780dded66731bc4ad53672cc935b87a4ce1e77d99fbd92d1771d789b0c3905160f1981c20b503256767585da9ea2a1bf872c4bc5c4e3e96a4fa8308651d87d021c12c29f696812a438c8fd916c7c8ae0729547e37d6863589397325067544099ebbc6bd4f10b60009e593e207e1a94da89f18a215721551f25b108ba52e5512d494fecf82c647cb284273951af36bd24cf977553136e1d4f5058c01bc9e2dd5ab9d514e38e72f269afaa902501f8daa3d7708152fd1f49454dd45bb8b34c325b11af3ab351879de370d04c0323e5687cdd8e683bdfd544d2623bc873fd27b5e8577d3d1d8900f9b6b400a16e8d92215944472fc53c98ee29c65d0302ea0211e08a3b6383506e19409b94a67a74f86858820dd0ebc1971e61c6432db52321d9cc0c1884fa917d04ad91206d2e2e9463153b88e210d224871649f2ff48b64501bbf7ac9a34ff96f8fd436194508fd47f7f8964834eb2f20041b4b676c0af8f799ecce7e67c06495817d94dd98d1448f6e552bc7ba272afd1cb629f8967d93ce4c9f86ffe99db8c1b3e6b3c2e659adab8083284bc0b3dbf66a20cf8ffe281f4c3b40f9e3e0a8461b3a14e5480d1c249810380434df6ee7436fac04fd6006f6e810f5703f1b5cf88d0a673f8e5967c0324a1b9c2ac82da22b51e464466304f530e9524d1795ed874cb60ff0cf529c7e231b6738423ff26e02dd6dda47e159e0fc391d563b51b4af82172496c903898fe7097642f9c213df2838d33953f41c9317fc664e08d3f06e82a5a5a8476c47a40c72305000b98f8ad2ddfb1af37ad6ecc9ea1b45db1b2d62f3542b4eed4b036a2137f84dee4f1a732650e6263f6794d7383f78c673bea7f6f3dd5782783091b363448bd43c1853a981ad03451e9e6c61a5f05ffd37e86f3a4054841e87a27097afb6cf64334c37dc4f66ae69bc37f3e17ddd51bf42325734f639f6b0a8a6b5e0bd436495781bc72e8b9463880a5e72602e26cc0ec173f014e74d553ff70541b04490a01e22448d625a7f6577bb3377bcd316ef0a6bbd9e756d53946809516670d77de2c9a258dccf6c31cb9c027be0ca43deb8b8867b2711849dc806ec97f0d79b39a0157b6b33b933d6f47a4254484cb5a82479ee3eda8dad6f45d7f99632632ae5d55cc1b6c154bba8c9522f774ec30291ea1421e9499f164e2df531ec53f8f26e2e9e323ed4ac459fb9fb8f0bfb248839ebbe8613560c17200a209dd6b71b5cc05055c53fc819dd00318a5dca62af5034161423e52033f46abf0a17f177a29309a8de1e351ab7abb4e3a4130306d0b36f3199177345976c13acc7aeb5254be96663a9e42d51873911855e2ca3afbd8aaa11e30d48705caff9394110dba2f1ce835293c8e8aeed31ad774dd674a9000cd417a007cffd4f264123386e04e1234d664f2adb1f8984ef9e1324562170a2bc1877c6ba4aaee809711713992e9078da8bd2ed97e5626a7130a2c566f38ee8f880b9ef20c853b0b3ab0672c3aa148a96c1344f421bd105df91c38c4b0e8b634c7d32fcf2bf4e0e0abba988b4cbf571de69ca2c4414475c6c841865e68bcd50321fc469eff6de56c37a26730f089bd23e0e8cd57099e27e44ea596e24aa79cf17c31e5929b59e5abf72b888f6957e7f11808416cda3700301ef75a284eeee418cbe4f73e93ba80e0bc703d0ff267d2818abad2fd821e67bf84239dc3f438c6d7b623ce7588c2455649093fd9ebe6712f2067e5dfb60e201f9a34e47df8d4d48e21e709a8c2812ff31c5cbfef0571c58c6cc485afc3f9c3cb5d4baef6061f65ef09f15816d22548fced65ebbdb1c122df610bdefe271792a8c7cf921620b8eceafa69a9461880a59b7d67099daa8a3c389a8aedc33ae3abe202922b1b64b66f7a185cba00cd0814e597409cceda18f52d12f46d545cf8eaa4fd657bc04a5863940872250a76b25dbea348b050de7635889e2254fc523a0123db7e478d75755418a62787b045b279fdd8ab252f4570d94b4ed2fe01ffb1a5a0388d4d800355881010ba4a5f0173296413fd4a78ed8e7e0bfbb4c81b2cde7fd9dc5c282dcea5b0561f45a33333e2e0d9bf262c7a2e65ee93dcbb7f21720a60165a61ae1c7f16db747181a92332b94d66cb8bd6649572fe0428afc9edf96efcea42569df01f737cfb7f8656fce41d6f850529c59a495adefc55448f9beceb99da144347b6f7ad99cc807f3bb2862ce1923b5be09fd050d5d42023a538d10754bf72f24470e73b8b0a7a148a69c20fd50ff535190c6976ea46de0a0a6bf866570dc7ca86ffe5e543b7b58f5f12ff4b7881b66e9e0da952e50c51374ba3609d5a71c8cf9f1f88cc05be933c1460828d463cd443ab812fbd1fc02cea1ba86d5510731a106fd618fba4a11e7ea129f6e091505ad119993f5a736eadb27e8ca4763af1a69a5cb335c2919f074153c788124bb67c438c19b78cc8913eed9dacd25ac72e7f56087721ca566bc5c24e1b7b57b65841e2f018746708f47cb2ee845b32ea6b5e26b42452798bc9e920ed5ca77a4fb95b7f658f57f2f406b65183d81b4bdcf4a9a2ecbad21032941f23b9185e3142e2e4541c339c68ddba34665ef1c1a64c7cc720d9d973a5def6bb29cb68ba00fa701c31e14ae1acc7f8cfffc44d6386da325aa32c1f2ccf65f4383720dc9041624472b28737c008c4a4c2938d862992f33f514885bfc6953cdf76fb7e64240538d7d8d26c4aaac5059f4881ff4f432e7048ce005e0f389e38371de6eae9b1813ba8b4b6df4aee0e29b7958cd3fe22e0858fb6d69263f2a3ee7ce1d2bdf53e0134dd3956ea3a296a4b2fc15b3ea6028a352635c3d0018f0ba46eb8c59de25f4c589fdaa4854ee7fb16a53dc3c34ecc20f7eee68e62f46efc7718aec712eff88496fd69a89fa1b3d085867eb23b1a3b26542b1584ad34340848144c5985b6bbfb249c1ad61d1a1fc1a30e509f452c22be479c4492719c4977dc4e3cde8a90ab0e0d18089d846f4b71aa07a68416c5d7b7eb3dc6ba2100bd5da7477e25fba86bd30ce05c203d757a0accbb38c8d30cc82a1c7788ba697fe55ad44524fe4613b30b242e9b32e8550f9b6a5d031b334f6b78c5aac91d42548535d07fb4d2ebc25e193d657ee70cc78522e517412752e34f088f02723ab6c52f32c5de46f59ed2499a623bfe55e43bb5d7b040b32d761d929972fdadd97573072f28de6cd5bcc03348c60a69e045ffbfaecbd059d46e0b386fc072af497b9e498c9c3423deedba2e5e7052c0ff28a24ee16b25cb2d53b66532753c97c55cd464456f8dc8d17ac42c86ddd06fa29d64c0fd998701e9065811822aa3f2234d3ee5762c68d19fbac083d816887f35abe503516c59002a62e5c2957a6b3ebcc2d6e9d73b942894e1be3f277046bd2c4a79f3b2645e9902fe17f347c7b58248da1085ac9febdff2e0313e0a0c00cba4ed05e8c21409ab83f007ba0088eb4f750b5cfaee922586cf84ee4f66e9e2dcab6723004d2da07e78204e49384c9809ab073997eb161d4e6204e225b14d01b5fa7276cdf4d68872d37bc7643cdab4848314aad1f2b7263b32919b23cb704bcf19231f390ccf70606b2400eea491950ac7ef7d9ef8e5e9b744be1f8d741774298f9469ac734332c0f6dc0f9bb3ed272952631b453d5d4cf8882291b89a10af928200853faf7530e806777c4f62ad129440a32d70656c524d9fcc65a4692104487872343afb1c692c95ed87e07bc7fd17e12919e17b6a1a2013195b695992e314de5e75a76e5db94664ae1de5935285ca6b607f823cc7b0b71eb9b91218e3e28b9f63fad129bbef8b241e02ef85a750933d41367dc51050e736149b16c7189189d3e457cea5f638aa9d945ba53aa3b09cfeab2581a894acc57a218b215519a8b84620814363a64fe5226fcd0c4128d5bb1e7a57d0a239fb87b9e72fd3896b75e66cd824463c4fbb416f81fd14e9763a68126ea954098b83434b2e82192c0a0f7c168f75a0840f271109280d281c778aaedf54c39b71528a275ec925aafdeeeb7c0d8e19f2f57d11796fa6b52a2a98bd8908f507b5678ee106a5c7abc5156c16f2da4063db3c36c527bbaa04d565dbd14ec316bbc0d63040471a4f1be551ce88fc408477fb4da1354873c97f8edf952aa970b2c2ba16fb258bc128dba4c264c22768cf217c1cc3c89abd77ca3c3dbcd506d8de4971fe928d8f45e5a2db060e26853e224488e91e117a4a1bd7309033574e4baacd2e09391ecc8c5bd382158160dde6779ed7e5062eaec39114d2e80b9bf09357a62ee34f8641c653aed81942f47aa9246219e5abe57e77c0a12f5b75baeaf1c8d312d861d68ac55ed163fdcb52e5d0366ff682a90afc639977bb65c413ba844f2760b6a15d8a15ec4ebe751e2c84205522b772fac45ea3262d6284b1736f90b8600baa1bb9430b0bc9819b7667d7ac272e1484d8ee4d2aa5b55056aa76dee257de5bc125ed0ae5db3779edd90461e22dc22f0309f0372429eacfd378f8da605bc9b5599999be6b0581199e8f28adaaf6f1722f47e42b033e773d51d4f802cb954086e86e116866231b345e41044e780d18458d67bf227ccdc61ea2032608ae5804c0f2043f2494a58530c3744835acc0513b8bc37f827ba94066d59b4ccb3d65fadb9e96be4d677da42cb6cb973b548e29d0ead2daab60c843347f69d531bbdfa1282935921c9213d76948ecfe8ece48967808110c731e21030c06ae675191f5b7188b2f6f841defbbcdd40d7d5adb05938a0706877ffae3f98fe74bda4bff7726c4f16d817d45d3f9b6cefa98df47b5fe9c5b655d29c5081fb3f7d6de7a45557c38a0081b397badbfe25a65278d6e57f7636ae936f732f20353f07787e4b5a6c934818e314f0049d4e8bebff40569794ebf326b1209642030acb15b1830a2b2ac5900114d89f2af038daa68c7d2422f717cbc"}}}}}}}, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') ioctl$KVM_CREATE_PIT2(r0, 0x4040ae77, &(0x7f0000000140)={0x274}) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x30, r1, 0x308, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x4109, 0x0, {0x14, 0x18, {0x1ff, @bearer=@udp='udp:syz0\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x4800}, 0x40000) 03:38:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x40030000000000}, 0x0) 03:38:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x80000000, 0x80100) ioctl$INOTIFY_IOC_SETNEXTWD(r1, 0x40044900, 0x80000001) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x20000, 0x0) getpeername$ax25(r2, &(0x7f0000000140)={{0x3, @default}, [@default, @rose, @null, @remote, @rose, @null, @null, @rose]}, &(0x7f00000001c0)=0x48) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:41 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 820.388248] overlayfs: unrecognized mount option "w" or missing value [ 820.399642] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 [ 820.430943] audit: type=1804 audit(2000000321.737:438): pid=5512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/476/file0" dev="sda1" ino=16579 res=1 03:38:41 executing program 4: r0 = socket$nl_crypto(0x10, 0x3, 0x15) read(r0, &(0x7f0000000180)=""/173, 0xad) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x2000, 0x0) setsockopt$netrom_NETROM_IDLE(r1, 0x103, 0x7, &(0x7f0000000240)=0x4, 0x4) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0xffffffffffffff5c, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x2e, 0x301, 0xfffffffffffffffd, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) 03:38:41 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 820.498780] audit: type=1804 audit(2000000321.776:439): pid=5512 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/476/file0" dev="sda1" ino=16579 res=1 03:38:41 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x260, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) [ 820.647111] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:42 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x02', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:42 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)=ANY=[@ANYBLOB="ffe0fffff7ffffffffffffff08004500e2c300000000002f9078ac14ffbbe000000100000000ca889078"], 0x0) 03:38:42 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 820.750430] overlayfs: unrecognized mount option "w" or missing value [ 820.764327] audit: type=1804 audit(2000000322.064:440): pid=5546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/477/file0" dev="sda1" ino=16565 res=1 03:38:42 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092500090007110aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 820.849206] audit: type=1804 audit(2000000322.064:441): pid=5546 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/477/file0" dev="sda1" ino=16565 res=1 03:38:42 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000340)) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000300)=0x7, 0x4) sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x174, r1, 0xc01, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x490}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffff7}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffff80000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4c}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}]}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x683}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1ff}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}]}]}, 0x174}, 0x1, 0x0, 0x0, 0x8000}, 0x8001) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000040)=0x8, 0x4) 03:38:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:42 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x4000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:42 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab0925000900070060ab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) [ 821.183017] overlayfs: unrecognized mount option "w" or missing value [ 821.201973] audit: type=1804 audit(2000000322.490:442): pid=5577 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/478/file0" dev="sda1" ino=16552 res=1 [ 821.239074] audit: type=1804 audit(2000000322.520:443): pid=5580 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir110871646/syzkaller.vrgCVe/478/file0" dev="sda1" ino=16552 res=1 03:38:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x202a02, 0x2) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000240)=0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cachetag={'cachetag'}}, {@fscache='fscache'}, {@nodevmap='nodevmap'}], [{@smackfsroot={'smackfsroot', 0x3d, 'vboxnet1trusted:trusted|proc%\'+[./vboxnet0'}}]}}) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="140004010100000000000000000000000e000000"], 0x14}}, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r1, 0x110, 0x3) 03:38:42 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x01', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:42 executing program 3: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x2, 0x420001) ioctl$KVM_PPC_GET_SMMU_INFO(r0, 0x8250aea6, &(0x7f0000000040)=""/1) 03:38:42 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:42 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xd801000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:43 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) read(r0, &(0x7f00000000c0)=""/221, 0xdd) flock(r0, 0x2) flock(r0, 0x2) sendmsg(0xffffffffffffffff, &(0x7f0000001b80)={&(0x7f0000000280)=@in6={0x18, 0x2}, 0xc, 0x0, 0x0, &(0x7f0000001880)=[{0x68, 0x0, 0x9, "1d33fcf4983c86128d9340ddd0a4bd54b7d76c49ba1fadd22c3bcf817b7be6c2ca3ba0638af024d3fca9fb1e39d89c9605fbe805384bd968b35c2d8fc799b5b706a9c5e1cec845054a7ce67bbb144cb549d2"}], 0x68}, 0x2) 03:38:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r1, 0x500, 0x70bd25, 0x25dfdbfd, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x6, @media='eth\x00'}}}, ["", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x40000) sendmsg$TIPC_CMD_SET_LINK_TOL(r0, &(0x7f0000000340)={&(0x7f0000000240), 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x68, r1, 0x0, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x10000, @link='broadcast-link\x00'}}}, ["", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x4) 03:38:43 executing program 3: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) flock(r0, 0x2000000000000003) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) r2 = syz_open_pts(0xffffffffffffffff, 0x0) read(r2, &(0x7f00000000c0)=""/221, 0xdd) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000340)='2', 0x1}], 0x1) 03:38:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:43 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\xed', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 821.843602] overlayfs: unrecognized mount option "w" or missing value 03:38:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab092500090007040aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x400, 0x0) syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x3, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'vcan0\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f00000001c0)={@remote, r2}, 0x14) [ 821.933007] net_ratelimit: 23 callbacks suppressed [ 821.933015] protocol 88fb is buggy, dev hsr_slave_0 [ 821.943122] protocol 88fb is buggy, dev hsr_slave_1 03:38:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:43 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x3f00000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:43 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 03:38:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:43 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vfio/vfio\x00', 0x4006, 0x0) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000140)=0x81) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x4000, 0x0) write$apparmor_current(r1, &(0x7f00000000c0)=@profile={'permprofile ', '$cgroup/ppp1{\x00'}, 0x1a) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000002e00010300000000000000000e000000474f6e78f37ac0a6a8f8d28921"], 0x1}}, 0x0) 03:38:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:43 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x05', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x10000, 0x0) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000080)={0x6, [0x6, 0x1, 0x0, 0x6, 0x1f, 0x8]}) [ 822.308292] overlayfs: unrecognized mount option "w" or missing value 03:38:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:43 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:43 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0xc401000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r1, 0x900, 0x70bd27, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000010}, 0x880) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) 03:38:44 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="fc0000004a000700ab0925000900070e0aab80ff000000000000369321000100ff0400000000000000000000ff000000000000008656aaa79bb94b46fe0000000700020800008c0000036c6c256f1a272f2e117c22ebc205214000000080008934d07302ade01720d7d5bbc91a3e2e80772c74fb2cc56ce1f0f156272f5b00000005defd5a32e2082038f4f8b29d3ef3d92c83170e5bbab2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b170083df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a873cf10000000000f7008000ef86a110", 0xfc) 03:38:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:44 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 03:38:44 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xc5f628f, 0x80) ioctl$SIOCX25GSUBSCRIP(r0, 0x89e0, &(0x7f0000000140)={'yam0\x00', 0x101, 0x7fffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) [ 822.739707] protocol 88fb is buggy, dev hsr_slave_0 [ 822.744899] protocol 88fb is buggy, dev hsr_slave_1 [ 822.749752] protocol 88fb is buggy, dev hsr_slave_0 [ 822.750077] protocol 88fb is buggy, dev hsr_slave_0 [ 822.755023] protocol 88fb is buggy, dev hsr_slave_1 [ 822.760026] protocol 88fb is buggy, dev hsr_slave_1 03:38:44 executing program 3: ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, 0x0) r0 = memfd_create(&(0x7f0000000080), 0x0) sigaltstack(&(0x7f0000ffd000/0x1000)=nil, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) readahead(0xffffffffffffffff, 0x3, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000480)) setitimer(0x1, &(0x7f00000000c0)={{}, {0x0, 0x2710}}, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, &(0x7f0000004dc0)) ioctl$KDSIGACCEPT(0xffffffffffffffff, 0x4b4e, 0x0) socket$inet(0x2, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, &(0x7f0000000080)) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e5e2) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) ptrace$pokeuser(0x6, 0x0, 0xd951, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='smaps\x00') getresgid(&(0x7f00000003c0), 0x0, 0x0) sendfile(r0, r3, &(0x7f0000000000), 0x7ffffffd) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) 03:38:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={r1, r2, r4}, 0xc) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x14}}, 0x200) ioprio_set$uid(0x3, r3, 0x6) [ 822.803063] overlayfs: unrecognized mount option "w" or missing value 03:38:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:44 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 822.892554] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:44 executing program 1: mkdir(0x0, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000180)={'L-', 0xfff}, 0x28, 0x0) ioprio_set$uid(0x0, 0x0, 0x0) syz_mount_image$ntfs(0x0, &(0x7f0000000080)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x25) ioctl$VIDIOC_DBG_G_REGISTER(0xffffffffffffffff, 0xc0385650, &(0x7f0000000380)={{0x0, @addr=0x200}, 0x8, 0x7, 0xf0f}) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm_plock\x00', 0x0, 0x0) r1 = open(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_dccp_int(r1, 0x21, 0x11, &(0x7f00000005c0), &(0x7f0000000880)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000340)=0xe8) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x80, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_L='version=9p2000.L'}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, '\x00'}}], [{@fsname={'fsname', 0x3d, 'overlay\x00'}}, {@appraise_type='appraise_type=imasig'}, {@euid_lt={'euid<', r3}}, {@seclabel='seclabel'}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="75707065726469723d2e2f66d23eba6658c093a05a5d3ec79cd37f7d6c65302c6c6f7765726469723d2e2f66a53e20c01ad14738fd38e26b490d3c696c65302c7700"]) r4 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r4) r5 = open(&(0x7f0000000600)='./file0\x00', 0x141042, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) write$binfmt_aout(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="320a0540000000800000"], 0xa) bpf$MAP_CREATE(0x400000000000000, &(0x7f0000000000)={0x10000000a, 0x4, 0x600, 0x51, 0x0, 0xffffffffffffffff, 0x0, [0x38c]}, 0x2c) 03:38:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r1, 0x420, 0x70bd27, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x5}}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4001}, 0x4000004) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0xe, 0x40000}}, 0x14}}, 0x0) r2 = add_key(&(0x7f0000000200)='cifs.spnego\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f0000000280)="a7ef8077b88e8d231f0e40838abbd36708c0c19c2e49e60773e25d7f14e173a002e3d6a62ac4f99a99e330b9bd0a6357307fd039e810f5c9d6fe1fe55770c0fb246e85e168db4b57e98769d441286611026bd5f4927af2c4fdf444354e9b2ff2414728", 0x63, 0xfffffffffffffffa) keyctl$set_timeout(0xf, r2, 0x6) [ 823.006937] REISERFS warning (device loop0): sh-2021 reiserfs_fill_super: can not find reiserfs on loop0 03:38:44 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) 03:38:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:44 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000380)='reiserfs\x00', &(0x7f00000004c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 823.145197] kasan: CONFIG_KASAN_INLINE enabled 03:38:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) 03:38:44 executing program 5: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000380)="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", 0xfc) [ 823.200845] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 823.240533] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 823.246812] CPU: 0 PID: 5724 Comm: syz-executor3 Not tainted 4.20.0-rc7-next-20181224 #1 [ 823.255053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 823.264429] RIP: 0010:transparent_hugepage_enabled+0x8c/0x5e0 [ 823.270322] Code: 80 3c 02 00 0f 85 b2 04 00 00 4c 8b a3 a0 00 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d bc 24 b8 01 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 95 04 00 00 49 8b bc 24 b8 01 00 00 e8 bd 82 e6 [ 823.289233] RSP: 0018:ffff888094f47288 EFLAGS: 00010202 [ 823.294597] RAX: dffffc0000000000 RBX: ffff88808dc0eb98 RCX: ffffc9000c229000 [ 823.301865] RDX: 0000000000000037 RSI: ffffffff81c8242a RDI: 00000000000001b8 [ 823.309133] RBP: ffff888094f472b0 R08: 1ffff110127309cc R09: ffffed10127309cd [ 823.316400] R10: ffffed10127309cc R11: ffff888093984e63 R12: 0000000000000000 [ 823.323679] R13: ffff88808dc0ec38 R14: dffffc0000000000 R15: 0000000000000f5c [ 823.330978] FS: 00007fb869a84700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 823.339216] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.345099] CR2: 00007ffdb3a89f0c CR3: 0000000094a8d000 CR4: 00000000001406f0 [ 823.352372] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 823.359640] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 823.366903] Call Trace: [ 823.369532] show_smap+0x179/0x590 [ 823.373081] ? show_numa_map+0xda0/0xda0 [ 823.377164] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 823.382183] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 823.387740] ? kasan_check_read+0x11/0x20 [ 823.391901] ? _copy_to_user+0xc9/0x120 [ 823.395886] seq_read+0x4db/0x1130 [ 823.399446] do_iter_read+0x4a9/0x660 [ 823.403253] ? dup_iter+0x260/0x260 [ 823.406894] vfs_readv+0x175/0x1c0 [ 823.410443] ? compat_rw_copy_check_uvector+0x3f0/0x3f0 [ 823.415853] ? iov_iter_revert+0xaa0/0xaa0 [ 823.420107] ? lock_downgrade+0x910/0x910 [ 823.424266] ? kasan_check_read+0x11/0x20 [ 823.428420] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 823.433700] ? rcu_read_unlock_special+0x380/0x380 [ 823.438642] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 823.443666] ? iov_iter_pipe+0xba/0x2f0 [ 823.447683] default_file_splice_read+0x50c/0xac0 [ 823.452543] ? kfree+0x173/0x230 [ 823.455923] ? iter_file_splice_write+0xfc0/0xfc0 [ 823.460772] ? __kasan_slab_free+0x119/0x150 [ 823.465202] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.470744] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.476285] ? fsnotify+0x4f5/0xed0 [ 823.479945] ? security_file_permission+0x94/0x320 [ 823.484899] ? rw_verify_area+0x118/0x360 [ 823.489049] ? iter_file_splice_write+0xfc0/0xfc0 [ 823.493901] do_splice_to+0x12a/0x190 [ 823.497714] splice_direct_to_actor+0x31b/0x9d0 [ 823.502395] ? generic_pipe_buf_nosteal+0x10/0x10 [ 823.507246] ? do_splice_to+0x190/0x190 [ 823.511240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.516784] ? rw_verify_area+0x118/0x360 [ 823.520962] do_splice_direct+0x2c7/0x420 [ 823.525114] ? splice_direct_to_actor+0x9d0/0x9d0 [ 823.529985] ? rcu_read_lock_sched_held+0x110/0x130 [ 823.535006] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 823.539763] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 823.545318] ? __sb_start_write+0x1ac/0x360 [ 823.549652] do_sendfile+0x61a/0xe60 [ 823.553379] ? do_compat_pwritev64+0x1c0/0x1c0 [ 823.557971] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 823.563513] ? _copy_from_user+0xdd/0x150 [ 823.567668] __x64_sys_sendfile64+0x15a/0x240 [ 823.572172] ? __ia32_sys_sendfile+0x2a0/0x2a0 [ 823.576761] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 823.581556] do_syscall_64+0x1a3/0x800 [ 823.585455] ? syscall_return_slowpath+0x5f0/0x5f0 [ 823.590403] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 823.595420] ? __switch_to_asm+0x34/0x70 [ 823.599490] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 823.604346] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 823.609588] RIP: 0033:0x457ec9 [ 823.612841] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 823.631740] RSP: 002b:00007fb869a83c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 823.639490] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457ec9 03:38:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, 0x2e, 0x301, 0x0, 0x0, {0x6, 0x40000}}, 0x14}, 0x1, 0x0, 0x0, 0x0}, 0x0) [ 823.646795] RDX: 0000000020000000 RSI: 0000000000000006 RDI: 0000000000000003 [ 823.654083] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 823.661365] R10: 000000007ffffffd R11: 0000000000000246 R12: 00007fb869a846d4 [ 823.668661] R13: 00000000004c4b6b R14: 00000000004d8278 R15: 00000000ffffffff [ 823.675956] Modules linked in: [ 823.679426] protocol 88fb is buggy, dev hsr_slave_0 [ 823.684511] protocol 88fb is buggy, dev hsr_slave_1 [ 823.692635] kobject: 'loop1' (00000000c9c742c2): kobject_uevent_env [ 823.699232] kobject: 'loop1' (00000000c9c742c2): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 823.709420] ---[ end trace 413b40aaa223f1bf ]--- [ 823.714340] RIP: 0010:transparent_hugepage_enabled+0x8c/0x5e0 [ 823.717231] kobject: 'loop1' (00000000c9c742c2): kobject_uevent_env [ 823.720352] Code: 80 3c 02 00 0f 85 b2 04 00 00 4c 8b a3 a0 00 00 00 48 b8 00 00 00 00 00 fc ff df 49 8d bc 24 b8 01 00 00 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 95 04 00 00 49 8b bc 24 b8 01 00 00 e8 bd 82 e6 [ 823.720361] RSP: 0018:ffff888094f47288 EFLAGS: 00010202 [ 823.720374] RAX: dffffc0000000000 RBX: ffff88808dc0eb98 RCX: ffffc9000c229000 [ 823.720384] RDX: 0000000000000037 RSI: ffffffff81c8242a RDI: 00000000000001b8 [ 823.720394] RBP: ffff888094f472b0 R08: 1ffff110127309cc R09: ffffed10127309cd [ 823.720404] R10: ffffed10127309cc R11: ffff888093984e63 R12: 0000000000000000 [ 823.720413] R13: ffff88808dc0ec38 R14: dffffc0000000000 R15: 0000000000000f5c [ 823.720426] FS: 00007fb869a84700(0000) GS:ffff8880ae600000(0000) knlGS:0000000000000000 [ 823.720436] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 823.720446] CR2: ffffffffff600400 CR3: 0000000094a8d000 CR4: 00000000001406f0 [ 823.720459] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 823.720468] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 823.720476] Kernel panic - not syncing: Fatal exception [ 823.728103] Kernel Offset: disabled [ 823.833321] Rebooting in 86400 seconds..