root'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@euid_gt={'euid>', r2}}, {@appraise='appraise'}, {@dont_appraise='dont_appraise'}, {@smackfshat={'smackfshat', 0x3d, 'security.ima\x00'}}]}}) 20:15:14 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x3600) 20:15:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0090000000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 919.505425] overlayfs: missing 'lowerdir' [ 919.528213] overlayfs: missing 'lowerdir' [ 919.668630] overlayfs: './file0' not a directory 20:15:14 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000300"}, 0x1c) 20:15:14 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6c}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f060000003188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000300)='./file1\x00', 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/rtc0\x00', 0x80002, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000400)=0x1) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000440)) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) removexattr(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)=@random={'osx.', 'overlay\x00'}) 20:15:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d00a0000000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:14 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x3626) 20:15:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c65312060c046136f373d300a8b296802d0b782eee6cb1b836e19449f353a2b0e44d0c6f4ca8c41b9f4547c03a7cca90b5f6cb2e1934b6c50b2644a934b2e4dd1742468d00507a001371269bfceeaba218d0fead6a7e174402a63"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 920.241712] overlayfs: './file0' not a directory 20:15:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x71}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:15 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x3c00) 20:15:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 920.389064] overlayfs: failed to resolve './file1 `Fo7=0 [ 920.389064] )hзnD5:+DʌAT|̩ _lKlPdJK.Mt$h7i!֧t@*c': -2 [ 920.421763] overlayfs: failed to resolve './file1 `Fo7=0 [ 920.421763] )hзnD5:+DʌAT|̩ _lKlPdJK.Mt$h7i!֧t@*c': -2 [ 920.520440] overlayfs: './file0' not a directory 20:15:15 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000400"}, 0x1c) 20:15:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x73}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653137bb992422cdb09bfed05ee01af08b5f98ba05f3bbef2940c3efee69f10d30de4540e56b3efba05d8b83e803d414a48ed4fd769eed237967c9ca35999e0e9e92522433ac8ab392b943299e7655d0cfe2d78a003340b909ce648291f51bfff514f243786ac65f7349b05b4a439e4f68404b73fcd788c0138321c8520600000000"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:15 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x3f00) [ 921.129085] validate_nla: 6 callbacks suppressed [ 921.129095] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 921.155185] overlayfs: failed to resolve './file17$"Ͱ^_)@i 0E@k>]v#yg5R$3C)vU׊': -2 20:15:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 921.181633] overlayfs: './file0' not a directory 20:15:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x74}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:16 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x4000) [ 921.219051] overlayfs: failed to resolve './file17$"Ͱ^_)@i 0E@k>]v#yg5R$3C)vU׊': -2 20:15:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = semget$private(0x0, 0x2, 0x20e) semctl$SEM_STAT(r1, 0x2, 0x12, &(0x7f00000003c0)=""/151) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 921.300334] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 921.321894] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 921.416190] overlayfs: './file0' not a directory [ 921.506339] overlayfs: './file0' not a directory 20:15:16 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000500"}, 0x1c) 20:15:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7a}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:16 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xa1ff) 20:15:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="75917065724371723d2e2f66696c65302c6c6ff787e6ce36b69eff1f776572646980004de1ceacb5889876bd03000000000000006f726b646930181fbee5cf2fb5cbb6eb1325e47f9ecaa2e4c5a782f2f91241f6f022206db3a0d4db3aa171acb10656d88ed52c5eb3e7f7ed6157173699a7556d6f70"]) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000200), &(0x7f00000002c0)=0x1c) getpeername$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @remote}, &(0x7f00000003c0)=0x1c) syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0xee5, 0x20000) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x8) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000480)='./file1/file0\x00', &(0x7f0000000380)='./file2\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 922.055238] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 922.076519] overlayfs: unrecognized mount option "uperCqr=./file0" or missing value [ 922.109140] overlayfs: './file0' not a directory 20:15:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xfa}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:16 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xe7fd) [ 922.164914] overlayfs: unrecognized mount option "uperCqr=./file0" or missing value [ 922.186925] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 922.311924] overlayfs: './file0' not a directory [ 922.332112] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:17 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000600"}, 0x1c) 20:15:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x300}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723dffffffff6c65d12f1b037765ca39fd30a1f240aa696c65312c776f726b6469723d2e2f66696c6531"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:17 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xf000) 20:15:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 922.958475] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 922.969288] overlayfs: missing 'lowerdir' [ 922.996751] overlayfs: './file0' not a directory 20:15:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 923.010404] overlayfs: missing 'lowerdir' [ 923.023450] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:17 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xfde7) 20:15:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x500}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowesdir=./file1,wo\x00\x00\x00\x00\x00\x00\x00\bfile1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 923.164278] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 923.208067] overlayfs: unrecognized mount option "lowesdir=./file1" or missing value [ 923.258737] overlayfs: unrecognized mount option "lowesdir=./file1" or missing value [ 923.260523] overlayfs: './file0' not a directory [ 923.318067] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:18 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x600}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:18 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\a\x00'}, 0x1c) 20:15:18 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xff01) 20:15:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="75707065726469723d2e08001d0065142c6c6f776572646972f12e2f66696465312c776f726e6461723d2e66696c65316ce3a700fab3aae247348aef0ed32280fe86d574cd11b8c54cb2bdf67721375036649a53a93ba9a36f3d53d29a1016d25990677165da0ee1d6807e6f2883feb632e28bb418"]) chroot(&(0x7f00000002c0)='./file1\x00') r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$SIOCRSSCAUSE(r1, 0x89e1, &(0x7f0000000300)) chdir(&(0x7f0000000280)='./file0\x00') ioctl$RNDGETENTCNT(r1, 0x80045200, &(0x7f00000003c0)) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') ioctl$RTC_IRQP_READ(r1, 0x8008700b, &(0x7f0000000200)) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000400)) 20:15:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 923.898554] overlayfs: missing 'lowerdir' [ 923.915541] overlayfs: failed to resolve './file1': -2 [ 923.930565] overlayfs: missing 'lowerdir' [ 923.934993] overlayfs: './file0' not a directory 20:15:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:18 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xff0f) 20:15:18 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x700}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.origin\x00', &(0x7f0000000300)='y\x00', 0x2, 0x2) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) syz_mount_image$nfs4(&(0x7f00000003c0)='nfs4\x00', &(0x7f0000000400)='./file1/file0\x00', 0x3, 0x3, &(0x7f0000000600)=[{&(0x7f0000000440)="6c68de28fb17df84a554cbbd7aa11c09bf516e951723cef499717b1a2589b1a111b7fef3a82e45663cac81ecab409471fc94da8656d527bd82449e82cc2addc597fd6b60c53112feaae1e4fe54224ab6adcc24fdefb16bca93c98dfa5dd8af38c8826c85c3d9dba0ecc3b1fb269e6802554ba147b3495371fc9a5195ade52d064da30c556b843e9feaad098eeeeda730fa0f531e27aa91caf6", 0x99, 0x3}, {&(0x7f0000000500)="ab8387fefe87670abe7cf211a9a1f3dc4e7904c40bd2c2fa57e9c3206b35d9717166c539a0d0c7b5d17903262f999166037744686f60580efa63faaa138e2b3306f0dbb897c26bdff8dd4cfea2100c923402413d85651098006478", 0x5b, 0x8}, {&(0x7f0000000580)="f27445abf6fb1c2b31103e20e00d180b33810cc1be61769f670db36ac43d7673f1427052c43fa14a77d2f3b45eddffc49ef6e009865c9cd654d7591bb01931294d521435adfac4b11dab1fb1058c60965b0ce9790884f2dd5c53dba3d8ceb3257bf36761b9e82aaefa02b9ba70fc705cb852", 0x72, 0xfffffffffffffffc}], 0x1000004, &(0x7f0000000680)='overlay\x00') 20:15:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 924.121790] overlayfs: failed to resolve './file1': -2 20:15:18 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xa00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 924.185912] overlayfs: './file0' not a directory [ 924.223786] overlayfs: './file0' not a directory 20:15:19 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xffa1) [ 924.462016] overlayfs: './file0' not a directory 20:15:19 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\b\x00'}, 0x1c) 20:15:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:19 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xe00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x1) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:19 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x11cff) 20:15:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d07a0000000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 924.902812] overlayfs: failed to resolve './file1': -2 [ 924.913066] overlayfs: './file0' not a directory 20:15:19 executing program 5: r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x20082) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r0, 0xc0385720, &(0x7f00000002c0)={0x1, {0x0, 0x1c9c380}, 0x8, 0x7ff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') umount2(&(0x7f0000000300)='./file1/file1\x00', 0x1) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0xfffffffffffffffc) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 924.936289] overlayfs: './file0' not a directory 20:15:19 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xf00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:19 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:19 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x200000) 20:15:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 925.152708] overlayfs: './file0' not a directory [ 925.160243] overlayfs: './file0' not a directory 20:15:20 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\t\x00'}, 0x1c) 20:15:20 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1018}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:20 executing program 5: 20:15:20 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x400000) 20:15:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:20 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:20 executing program 5: 20:15:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 925.874272] overlayfs: './file0' not a directory 20:15:20 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1800}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:20 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:20 executing program 5: 20:15:20 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x800000) [ 926.110783] overlayfs: './file0' not a directory 20:15:21 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\n\x00'}, 0x1c) 20:15:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000300000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1810}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:21 executing program 5: 20:15:21 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:21 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xf0ffff) [ 926.716701] validate_nla: 8 callbacks suppressed [ 926.716711] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 926.758902] overlayfs: './file0' not a directory 20:15:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setxattr$security_capability(&(0x7f0000000200)='\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000300)=@v1={0x1000000, [{0xfffffffffffffff7, 0x5}]}, 0xc, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000640)='./file1/file0\x00', 0x80000000) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in=@initdev, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000001c0)) mount$9p_unix(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='9p\x00', 0x80, &(0x7f00000005c0)={'trans=unix,', {[{@cache_mmap='cache=mmap'}, {@dfltuid={'dfltuid', 0x3d, r2}}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f0000000680)='./file1\x00', 0x0, 0x54) 20:15:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x2000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:21 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x1000000) 20:15:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:21 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3c00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 926.926789] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 926.976273] 9pnet: p9_fd_create_unix (3667): problem connecting socket: ./file1/file0: -20 [ 927.048977] overlayfs: './file0' not a directory 20:15:22 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x2000000) 20:15:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:22 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000e00"}, 0x1c) 20:15:22 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3f00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:22 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setxattr$security_capability(&(0x7f0000000200)='\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000300)=@v1={0x1000000, [{0xfffffffffffffff7, 0x5}]}, 0xc, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000640)='./file1/file0\x00', 0x80000000) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in=@initdev, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000001c0)) mount$9p_unix(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='9p\x00', 0x80, &(0x7f00000005c0)={'trans=unix,', {[{@cache_mmap='cache=mmap'}, {@dfltuid={'dfltuid', 0x3d, r2}}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f0000000680)='./file1\x00', 0x0, 0x54) [ 927.611577] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000600000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:22 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 927.689482] overlayfs: './file0' not a directory 20:15:22 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 927.712199] 9pnet: p9_fd_create_unix (3700): problem connecting socket: ./file1/file0: -20 20:15:22 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x3000000) 20:15:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setxattr$security_capability(&(0x7f0000000200)='\x00', &(0x7f00000002c0)='security.capability\x00', &(0x7f0000000300)=@v1={0x1000000, [{0xfffffffffffffff7, 0x5}]}, 0xc, 0x1) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000640)='./file1/file0\x00', 0x80000000) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000480)={{{@in=@initdev, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f00000001c0)) mount$9p_unix(&(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='9p\x00', 0x80, &(0x7f00000005c0)={'trans=unix,', {[{@cache_mmap='cache=mmap'}, {@dfltuid={'dfltuid', 0x3d, r2}}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f0000000680)='./file1\x00', 0x0, 0x54) [ 927.786993] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:22 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4300}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:22 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 927.965226] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 927.990689] overlayfs: './file0' not a directory [ 928.051291] 9pnet: p9_fd_create_unix (3726): problem connecting socket: ./file1/file0: -20 20:15:23 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00001000"}, 0x1c) 20:15:23 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x4000000) 20:15:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000900000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:23 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4800}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:23 executing program 5 (fault-call:9 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:23 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:23 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4c00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 928.585951] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 928.642960] overlayfs: './file0' not a directory [ 928.660344] FAULT_INJECTION: forcing a failure. [ 928.660344] name failslab, interval 1, probability 0, space 0, times 0 20:15:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:23 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x5000000) [ 928.712128] CPU: 1 PID: 3754 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 928.719186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 928.728541] Call Trace: [ 928.728572] dump_stack+0x172/0x1f0 [ 928.728596] should_fail.cold+0xa/0x1b [ 928.728619] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 928.728638] ? lock_downgrade+0x810/0x810 [ 928.728676] ? ___might_sleep+0x163/0x280 [ 928.752174] __should_failslab+0x121/0x190 [ 928.756422] should_failslab+0x9/0x14 20:15:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 928.760251] kmem_cache_alloc+0x2be/0x710 [ 928.764410] ? kasan_check_write+0x14/0x20 [ 928.768673] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 928.773538] ? check_preemption_disabled+0x48/0x290 [ 928.778574] getname_flags+0xd6/0x5b0 [ 928.782305] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 928.782388] getname+0x1a/0x20 [ 928.792848] do_sys_open+0x2c9/0x5d0 [ 928.796585] ? filp_open+0x80/0x80 [ 928.800134] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 928.804910] ? do_syscall_64+0x26/0x610 20:15:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 928.808896] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 928.814271] ? do_syscall_64+0x26/0x610 [ 928.818270] __x64_sys_open+0x7e/0xc0 [ 928.822084] do_syscall_64+0x103/0x610 [ 928.825992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 928.826486] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 928.831190] RIP: 0033:0x457e39 [ 928.831207] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 928.831216] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 928.831236] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 928.876018] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 928.883294] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 928.890574] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 928.890709] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 928.897845] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 929.043835] overlayfs: './file0' not a directory 20:15:24 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00`\x00'}, 0x1c) 20:15:24 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6100}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:24 executing program 5 (fault-call:9 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:24 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x6000000) 20:15:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 929.519983] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:24 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6300}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 929.596714] overlayfs: './file0' not a directory [ 929.611867] FAULT_INJECTION: forcing a failure. [ 929.611867] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 929.623735] CPU: 0 PID: 3786 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 929.630776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 929.640136] Call Trace: [ 929.642749] dump_stack+0x172/0x1f0 [ 929.646424] should_fail.cold+0xa/0x1b [ 929.650354] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 929.655480] ? debug_smp_processor_id+0x1c/0x20 [ 929.660164] ? perf_trace_lock+0xeb/0x510 [ 929.664324] ? mark_held_locks+0x100/0x100 [ 929.668580] should_fail_alloc_page+0x50/0x60 [ 929.673099] __alloc_pages_nodemask+0x1a1/0x710 [ 929.677790] ? __alloc_pages_slowpath+0x2900/0x2900 [ 929.682813] ? find_held_lock+0x35/0x130 [ 929.686898] cache_grow_begin+0x9c/0x8c0 [ 929.690983] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 929.696523] ? check_preemption_disabled+0x48/0x290 [ 929.701544] kmem_cache_alloc+0x645/0x710 [ 929.705702] ? kasan_check_write+0x14/0x20 [ 929.709966] getname_flags+0xd6/0x5b0 [ 929.713806] getname+0x1a/0x20 [ 929.717011] do_sys_open+0x2c9/0x5d0 [ 929.720734] ? filp_open+0x80/0x80 [ 929.724282] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 929.729043] ? do_syscall_64+0x26/0x610 [ 929.733506] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 929.738874] ? do_syscall_64+0x26/0x610 [ 929.742856] __x64_sys_open+0x7e/0xc0 [ 929.746676] do_syscall_64+0x103/0x610 [ 929.750574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 929.755761] RIP: 0033:0x457e39 [ 929.758954] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 929.778289] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 929.785995] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 20:15:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000f00000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 929.793259] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 929.800530] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 929.807810] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 929.815073] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:24 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x7000000) 20:15:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 930.126342] overlayfs: './file0' not a directory 20:15:25 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000fc00"}, 0x1c) 20:15:25 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6800}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:25 executing program 5 (fault-call:9 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:25 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x8040000) 20:15:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 930.457035] FAULT_INJECTION: forcing a failure. [ 930.457035] name failslab, interval 1, probability 0, space 0, times 0 [ 930.469172] overlayfs: './file0' not a directory [ 930.493776] CPU: 0 PID: 3825 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 930.500807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.500814] Call Trace: [ 930.500839] dump_stack+0x172/0x1f0 [ 930.500863] should_fail.cold+0xa/0x1b [ 930.500884] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 930.525404] ? lock_downgrade+0x810/0x810 [ 930.529611] ? ___might_sleep+0x163/0x280 [ 930.533813] __should_failslab+0x121/0x190 [ 930.538060] should_failslab+0x9/0x14 [ 930.538076] kmem_cache_alloc+0x2be/0x710 [ 930.538094] ? __save_stack_trace+0x8a/0xf0 [ 930.538123] __alloc_file+0x27/0x300 [ 930.554108] alloc_empty_file+0x72/0x170 [ 930.558207] path_openat+0xef/0x4690 [ 930.561951] ? __lock_acquire+0x53b/0x4700 [ 930.566201] ? getname+0x1a/0x20 [ 930.569592] ? do_sys_open+0x2c9/0x5d0 [ 930.573504] ? __x64_sys_open+0x7e/0xc0 [ 930.577487] ? do_syscall_64+0x103/0x610 [ 930.581558] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.586935] ? check_preemption_disabled+0x48/0x290 [ 930.591965] ? debug_smp_processor_id+0x1c/0x20 [ 930.596650] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 930.601350] ? __lock_is_held+0xb6/0x140 [ 930.605418] ? zap_class+0x460/0x460 [ 930.609135] ? __alloc_fd+0x430/0x530 [ 930.612941] do_filp_open+0x1a1/0x280 [ 930.616749] ? may_open_dev+0x100/0x100 [ 930.620728] ? lock_downgrade+0x810/0x810 [ 930.624883] ? kasan_check_read+0x11/0x20 [ 930.629041] ? do_raw_spin_unlock+0x57/0x270 [ 930.633451] ? _raw_spin_unlock+0x2d/0x50 [ 930.637598] ? __alloc_fd+0x430/0x530 [ 930.641412] do_sys_open+0x3fe/0x5d0 [ 930.645129] ? filp_open+0x80/0x80 [ 930.648694] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 930.653479] ? do_syscall_64+0x26/0x610 [ 930.657511] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.662874] ? do_syscall_64+0x26/0x610 [ 930.666859] __x64_sys_open+0x7e/0xc0 [ 930.670677] do_syscall_64+0x103/0x610 [ 930.674587] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.679798] RIP: 0033:0x457e39 [ 930.683008] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:15:25 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6c00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 930.701942] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 930.709653] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 930.716942] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 930.724211] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 930.731477] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 930.738772] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:25 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xc000000) 20:15:25 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7100}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:26 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000300"}, 0x1c) 20:15:26 executing program 5 (fault-call:9 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:26 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xd000000) 20:15:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7300}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7400}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:26 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xe260000) 20:15:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 931.402998] FAULT_INJECTION: forcing a failure. [ 931.402998] name failslab, interval 1, probability 0, space 0, times 0 20:15:26 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x10000000) [ 931.470054] CPU: 1 PID: 3869 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 931.477101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 931.486472] Call Trace: [ 931.489075] dump_stack+0x172/0x1f0 [ 931.492731] should_fail.cold+0xa/0x1b [ 931.496643] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 931.501775] ? lock_downgrade+0x810/0x810 [ 931.505936] ? ___might_sleep+0x163/0x280 [ 931.510100] __should_failslab+0x121/0x190 [ 931.514346] should_failslab+0x9/0x14 20:15:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 931.518167] kmem_cache_alloc_trace+0x2d1/0x760 [ 931.522864] ? ___might_sleep+0x163/0x280 [ 931.527025] ? __might_sleep+0x95/0x190 [ 931.531013] apparmor_file_alloc_security+0x112/0x940 [ 931.536221] security_file_alloc+0x69/0xb0 [ 931.540466] __alloc_file+0xac/0x300 [ 931.544200] alloc_empty_file+0x72/0x170 [ 931.548285] path_openat+0xef/0x4690 [ 931.552010] ? __lock_acquire+0x53b/0x4700 [ 931.556253] ? getname+0x1a/0x20 [ 931.559627] ? do_sys_open+0x2c9/0x5d0 [ 931.563528] ? __x64_sys_open+0x7e/0xc0 [ 931.567507] ? do_syscall_64+0x103/0x610 [ 931.571589] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.576962] ? check_preemption_disabled+0x48/0x290 [ 931.581983] ? debug_smp_processor_id+0x1c/0x20 [ 931.586655] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 931.586679] ? __lock_is_held+0xb6/0x140 [ 931.586696] ? zap_class+0x460/0x460 [ 931.586716] ? __alloc_fd+0x430/0x530 [ 931.586735] do_filp_open+0x1a1/0x280 [ 931.599602] ? may_open_dev+0x100/0x100 [ 931.599623] ? lock_downgrade+0x810/0x810 [ 931.599648] ? kasan_check_read+0x11/0x20 [ 931.611226] ? do_raw_spin_unlock+0x57/0x270 [ 931.611245] ? _raw_spin_unlock+0x2d/0x50 [ 931.611259] ? __alloc_fd+0x430/0x530 [ 931.611286] do_sys_open+0x3fe/0x5d0 [ 931.619569] ? filp_open+0x80/0x80 [ 931.619591] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 931.619606] ? do_syscall_64+0x26/0x610 [ 931.619623] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.653393] ? do_syscall_64+0x26/0x610 [ 931.657382] __x64_sys_open+0x7e/0xc0 [ 931.661206] do_syscall_64+0x103/0x610 [ 931.665108] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.670312] RIP: 0033:0x457e39 [ 931.673538] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 931.692442] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 931.700151] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 931.707435] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 931.714701] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 931.721970] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 931.729238] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:26 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000500"}, 0x1c) 20:15:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:26 executing program 5 (fault-call:9 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7a00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:26 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x12000000) [ 932.224497] validate_nla: 9 callbacks suppressed [ 932.224505] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:27 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x14000000) 20:15:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xfa00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 932.310827] FAULT_INJECTION: forcing a failure. [ 932.310827] name failslab, interval 1, probability 0, space 0, times 0 [ 932.335813] CPU: 1 PID: 3909 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 932.342847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 932.352198] Call Trace: [ 932.352233] dump_stack+0x172/0x1f0 [ 932.352258] should_fail.cold+0xa/0x1b [ 932.362341] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 932.367454] ? lock_downgrade+0x810/0x810 [ 932.371619] ? ___might_sleep+0x163/0x280 [ 932.375798] __should_failslab+0x121/0x190 [ 932.375819] should_failslab+0x9/0x14 [ 932.375834] kmem_cache_alloc+0x2be/0x710 [ 932.375851] ? debug_smp_processor_id+0x1c/0x20 [ 932.375867] ? perf_trace_lock+0xeb/0x510 [ 932.396845] ? mark_held_locks+0x100/0x100 [ 932.401099] __d_alloc+0x2e/0x8c0 [ 932.404571] d_alloc+0x4d/0x2b0 20:15:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 932.407861] ? find_held_lock+0x35/0x130 [ 932.411936] d_alloc_parallel+0xf4/0x1bc0 [ 932.416110] ? kasan_check_read+0x11/0x20 [ 932.420276] ? __d_lookup_rcu+0x6c0/0x6c0 [ 932.424431] ? __d_lookup+0x433/0x760 [ 932.428241] ? lookup_open+0x2c2/0x1b10 [ 932.432221] ? d_lookup+0xf9/0x260 [ 932.435778] ? lockdep_hardirqs_on+0x415/0x5d0 [ 932.440376] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 932.445393] ? d_lookup+0x19e/0x260 [ 932.449024] lookup_open+0x52a/0x1b10 [ 932.452853] ? vfs_link+0xb60/0xb60 [ 932.456511] path_openat+0x1e95/0x4690 [ 932.460400] ? __lock_acquire+0x53b/0x4700 [ 932.464621] ? getname+0x1a/0x20 [ 932.467972] ? do_sys_open+0x2c9/0x5d0 [ 932.471867] ? check_preemption_disabled+0x48/0x290 [ 932.476900] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 932.481575] ? __lock_is_held+0xb6/0x140 [ 932.485648] ? zap_class+0x460/0x460 [ 932.489372] ? __alloc_fd+0x430/0x530 [ 932.493181] do_filp_open+0x1a1/0x280 [ 932.497011] ? may_open_dev+0x100/0x100 [ 932.500988] ? kasan_check_read+0x11/0x20 [ 932.505137] ? do_raw_spin_unlock+0x57/0x270 [ 932.509560] ? _raw_spin_unlock+0x2d/0x50 [ 932.513710] ? __alloc_fd+0x430/0x530 [ 932.517526] do_sys_open+0x3fe/0x5d0 [ 932.521253] ? filp_open+0x80/0x80 [ 932.524788] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 932.529543] ? do_syscall_64+0x26/0x610 [ 932.533515] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 932.538881] ? do_syscall_64+0x26/0x610 [ 932.542858] __x64_sys_open+0x7e/0xc0 [ 932.546656] do_syscall_64+0x103/0x610 [ 932.550555] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 932.555748] RIP: 0033:0x457e39 [ 932.558941] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 932.577837] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 932.585551] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 932.592825] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 932.600088] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 932.607360] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 932.614612] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 932.628935] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xff00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 932.791905] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:27 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000600"}, 0x1c) 20:15:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x97d3a}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:27 executing program 5 (fault-call:9 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:27 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x18000000) 20:15:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 933.188851] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 933.189866] FAULT_INJECTION: forcing a failure. [ 933.189866] name failslab, interval 1, probability 0, space 0, times 0 [ 933.220875] CPU: 1 PID: 3944 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 933.227906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 20:15:28 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x1e000000) 20:15:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x99550}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 933.237261] Call Trace: [ 933.239866] dump_stack+0x172/0x1f0 [ 933.243509] should_fail.cold+0xa/0x1b [ 933.247407] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 933.252524] ? lock_downgrade+0x810/0x810 [ 933.256694] ? ___might_sleep+0x163/0x280 [ 933.260862] __should_failslab+0x121/0x190 [ 933.265146] should_failslab+0x9/0x14 [ 933.269057] __kmalloc+0x2dc/0x740 [ 933.272612] ? xattr_permission+0x300/0x300 [ 933.276964] ? d_alloc_parallel+0x7b0/0x1bc0 [ 933.281397] ? ovl_lookup_single+0x880/0x880 [ 933.285817] ? ovl_get_fh+0x69/0x2f0 20:15:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 933.289541] ovl_get_fh+0x69/0x2f0 [ 933.293097] ovl_lookup+0x164b/0x1a10 [ 933.296921] ? ovl_path_next+0x2e0/0x2e0 [ 933.300999] ? kasan_check_read+0x11/0x20 [ 933.305162] ? __d_lookup_rcu+0x6c0/0x6c0 [ 933.309324] ? __d_lookup+0x433/0x760 [ 933.313137] ? lookup_open+0x2c2/0x1b10 [ 933.317125] ? d_lookup+0xf9/0x260 [ 933.320688] ? lockdep_hardirqs_on+0x415/0x5d0 [ 933.325315] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 933.330345] ? d_lookup+0x19e/0x260 [ 933.333984] ? ovl_path_next+0x2e0/0x2e0 20:15:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 933.335517] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 933.338064] lookup_open+0x6d4/0x1b10 [ 933.338093] ? vfs_link+0xb60/0xb60 [ 933.338136] path_openat+0x1e95/0x4690 [ 933.356709] ? __lock_acquire+0x53b/0x4700 [ 933.360987] ? getname+0x1a/0x20 [ 933.364357] ? do_sys_open+0x2c9/0x5d0 [ 933.368264] ? check_preemption_disabled+0x48/0x290 [ 933.373292] ? check_preemption_disabled+0x241/0x290 [ 933.378416] ? path_lookupat.isra.0+0x8d0/0x8d0 20:15:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 933.379993] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 933.383103] ? __lock_is_held+0xb6/0x140 [ 933.383119] ? zap_class+0x460/0x460 [ 933.383149] ? find_held_lock+0x35/0x130 [ 933.383163] ? __alloc_fd+0x430/0x530 [ 933.383218] do_filp_open+0x1a1/0x280 [ 933.409889] ? may_open_dev+0x100/0x100 [ 933.413889] ? kasan_check_read+0x11/0x20 [ 933.418070] ? do_raw_spin_unlock+0x57/0x270 [ 933.422493] ? _raw_spin_unlock+0x2d/0x50 [ 933.425327] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 933.426713] ? __alloc_fd+0x430/0x530 [ 933.426745] do_sys_open+0x3fe/0x5d0 [ 933.426767] ? filp_open+0x80/0x80 [ 933.445106] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 933.449872] ? do_syscall_64+0x26/0x610 [ 933.453858] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 933.459222] ? do_syscall_64+0x26/0x610 [ 933.463199] __x64_sys_open+0x7e/0xc0 [ 933.467034] do_syscall_64+0x103/0x610 [ 933.470931] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 933.476121] RIP: 0033:0x457e39 [ 933.476138] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 933.476147] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 933.476162] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 933.476180] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 933.498256] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 933.498266] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 933.498276] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:28 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\a\x00'}, 0x1c) 20:15:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:28 executing program 5 (fault-call:9 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x100000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:28 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x20000000) 20:15:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c12") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 934.109569] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:28 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x24000000) [ 934.156643] FAULT_INJECTION: forcing a failure. [ 934.156643] name failslab, interval 1, probability 0, space 0, times 0 [ 934.188396] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x400000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 934.202481] CPU: 1 PID: 3977 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 934.209509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 934.218861] Call Trace: [ 934.221460] dump_stack+0x172/0x1f0 [ 934.225106] should_fail.cold+0xa/0x1b [ 934.229019] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 934.234151] ? lock_downgrade+0x810/0x810 [ 934.238316] ? ___might_sleep+0x163/0x280 [ 934.242484] __should_failslab+0x121/0x190 [ 934.246737] should_failslab+0x9/0x14 [ 934.250548] kmem_cache_alloc_trace+0x2d1/0x760 20:15:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0008100000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 934.255233] ? vfs_getxattr+0xc2/0x2a0 [ 934.259147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 934.264739] ? ovl_dentry_weird+0x3b/0x50 [ 934.266464] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 934.268895] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 934.268918] ovl_check_origin_fh+0x325/0x490 [ 934.268944] ovl_lookup+0x169a/0x1a10 [ 934.268971] ? ovl_path_next+0x2e0/0x2e0 [ 934.294003] ? kasan_check_read+0x11/0x20 [ 934.298167] ? __d_lookup_rcu+0x6c0/0x6c0 [ 934.302333] ? __d_lookup+0x433/0x760 [ 934.306144] ? lookup_open+0x2c2/0x1b10 [ 934.310138] ? d_lookup+0xf9/0x260 [ 934.313698] ? lockdep_hardirqs_on+0x415/0x5d0 [ 934.318289] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 934.323304] ? d_lookup+0x19e/0x260 [ 934.326940] ? ovl_path_next+0x2e0/0x2e0 [ 934.331002] lookup_open+0x6d4/0x1b10 [ 934.334821] ? vfs_link+0xb60/0xb60 [ 934.338479] path_openat+0x1e95/0x4690 [ 934.342367] ? __lock_acquire+0x53b/0x4700 [ 934.346615] ? getname+0x1a/0x20 [ 934.349982] ? do_sys_open+0x2c9/0x5d0 [ 934.353895] ? check_preemption_disabled+0x48/0x290 [ 934.358909] ? check_preemption_disabled+0x241/0x290 [ 934.364022] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 934.368704] ? __lock_is_held+0xb6/0x140 [ 934.372766] ? zap_class+0x460/0x460 [ 934.376566] ? find_held_lock+0x35/0x130 [ 934.380625] ? __alloc_fd+0x430/0x530 [ 934.384445] do_filp_open+0x1a1/0x280 [ 934.388260] ? may_open_dev+0x100/0x100 [ 934.392246] ? kasan_check_read+0x11/0x20 [ 934.396399] ? do_raw_spin_unlock+0x57/0x270 [ 934.400811] ? _raw_spin_unlock+0x2d/0x50 [ 934.404960] ? __alloc_fd+0x430/0x530 [ 934.408777] do_sys_open+0x3fe/0x5d0 [ 934.412526] ? filp_open+0x80/0x80 [ 934.416074] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 934.420828] ? do_syscall_64+0x26/0x610 [ 934.424807] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 934.430194] ? do_syscall_64+0x26/0x610 [ 934.434179] __x64_sys_open+0x7e/0xc0 [ 934.437999] do_syscall_64+0x103/0x610 [ 934.441904] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 934.447091] RIP: 0033:0x457e39 [ 934.450284] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 934.469185] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 934.476892] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 934.484157] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 934.491447] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 934.498716] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 934.505981] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:29 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x2a000000) 20:15:29 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\t\x00'}, 0x1c) 20:15:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x80ffff}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:29 executing program 5 (fault-call:9 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:29 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x30000000) 20:15:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:29 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x36000000) 20:15:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 935.090187] FAULT_INJECTION: forcing a failure. [ 935.090187] name failslab, interval 1, probability 0, space 0, times 0 [ 935.131505] CPU: 1 PID: 4023 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 935.138559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.148014] Call Trace: [ 935.150618] dump_stack+0x172/0x1f0 [ 935.154308] should_fail.cold+0xa/0x1b [ 935.158232] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 935.163349] ? lock_downgrade+0x810/0x810 [ 935.167509] ? ___might_sleep+0x163/0x280 [ 935.171683] __should_failslab+0x121/0x190 [ 935.175935] should_failslab+0x9/0x14 [ 935.179735] kmem_cache_alloc_trace+0x2d1/0x760 [ 935.184402] ? vfs_getxattr+0xc2/0x2a0 [ 935.188309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 935.193850] ? ovl_dentry_weird+0x3b/0x50 [ 935.197994] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 935.203531] ovl_check_origin_fh+0x325/0x490 [ 935.207962] ovl_lookup+0x169a/0x1a10 [ 935.211778] ? ovl_path_next+0x2e0/0x2e0 [ 935.215848] ? kasan_check_read+0x11/0x20 [ 935.220003] ? __d_lookup_rcu+0x6c0/0x6c0 [ 935.224153] ? __d_lookup+0x433/0x760 [ 935.227957] ? lookup_open+0x2c2/0x1b10 [ 935.231928] ? d_lookup+0xf9/0x260 [ 935.235472] ? lockdep_hardirqs_on+0x415/0x5d0 [ 935.240058] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 935.245073] ? d_lookup+0x19e/0x260 [ 935.248705] ? ovl_path_next+0x2e0/0x2e0 [ 935.252768] lookup_open+0x6d4/0x1b10 [ 935.256578] ? vfs_link+0xb60/0xb60 [ 935.260241] path_openat+0x1e95/0x4690 [ 935.264132] ? __lock_acquire+0x53b/0x4700 [ 935.268362] ? getname+0x1a/0x20 [ 935.271732] ? do_sys_open+0x2c9/0x5d0 [ 935.275627] ? check_preemption_disabled+0x48/0x290 [ 935.280656] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 935.285332] ? __lock_is_held+0xb6/0x140 [ 935.289387] ? zap_class+0x460/0x460 [ 935.293103] ? __alloc_fd+0x430/0x530 [ 935.296915] do_filp_open+0x1a1/0x280 [ 935.300712] ? may_open_dev+0x100/0x100 [ 935.304736] ? kasan_check_read+0x11/0x20 [ 935.308892] ? do_raw_spin_unlock+0x57/0x270 [ 935.313301] ? _raw_spin_unlock+0x2d/0x50 [ 935.317455] ? __alloc_fd+0x430/0x530 [ 935.321282] do_sys_open+0x3fe/0x5d0 [ 935.325003] ? filp_open+0x80/0x80 [ 935.328545] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 935.333300] ? do_syscall_64+0x26/0x610 [ 935.337270] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.342635] ? do_syscall_64+0x26/0x610 [ 935.346638] __x64_sys_open+0x7e/0xc0 [ 935.350462] do_syscall_64+0x103/0x610 [ 935.354369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.359572] RIP: 0033:0x457e39 [ 935.362776] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:15:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 935.381678] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 935.389394] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 935.396667] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 935.403974] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 935.411241] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 935.418503] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:30 executing program 5 (fault-call:9 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 935.662006] FAULT_INJECTION: forcing a failure. [ 935.662006] name failslab, interval 1, probability 0, space 0, times 0 [ 935.691013] CPU: 1 PID: 4045 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 935.698045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 935.707413] Call Trace: [ 935.709997] dump_stack+0x172/0x1f0 [ 935.713616] should_fail.cold+0xa/0x1b [ 935.717503] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 935.722609] ? lock_downgrade+0x810/0x810 [ 935.726745] ? ___might_sleep+0x163/0x280 [ 935.730911] __should_failslab+0x121/0x190 [ 935.735328] should_failslab+0x9/0x14 [ 935.739131] kmem_cache_alloc_trace+0x2d1/0x760 [ 935.743791] ? debug_check_no_obj_freed+0x200/0x464 [ 935.748800] ? find_held_lock+0x35/0x130 [ 935.752852] ovl_encode_real_fh+0xc6/0x4c0 [ 935.757076] ? ovl_set_attr+0x280/0x280 [ 935.761060] ? lock_downgrade+0x810/0x810 [ 935.765216] ovl_get_index_name+0x1d/0x80 [ 935.769352] ovl_lookup_index+0xdc/0x610 [ 935.773402] ? kfree+0x173/0x230 [ 935.776754] ? ovl_lookup+0x16a5/0x1a10 [ 935.780728] ? ovl_get_index_fh+0x230/0x230 [ 935.785039] ? trace_hardirqs_on+0x67/0x230 [ 935.789362] ? ovl_lookup+0x16a5/0x1a10 [ 935.793347] ovl_lookup+0x750/0x1a10 [ 935.797059] ? ovl_path_next+0x2e0/0x2e0 [ 935.801114] ? kasan_check_read+0x11/0x20 [ 935.805256] ? __d_lookup_rcu+0x6c0/0x6c0 [ 935.809391] ? __d_lookup+0x433/0x760 [ 935.813187] ? lookup_open+0x2c2/0x1b10 [ 935.817184] ? d_lookup+0xf9/0x260 [ 935.820722] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 935.825727] ? d_lookup+0x19e/0x260 [ 935.829356] ? ovl_path_next+0x2e0/0x2e0 [ 935.833445] lookup_open+0x6d4/0x1b10 [ 935.837243] ? vfs_link+0xb60/0xb60 [ 935.840882] path_openat+0x1e95/0x4690 [ 935.844763] ? __lock_acquire+0x53b/0x4700 [ 935.849164] ? getname+0x1a/0x20 [ 935.852547] ? do_sys_open+0x2c9/0x5d0 [ 935.856439] ? check_preemption_disabled+0x48/0x290 [ 935.861463] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 935.866144] ? __lock_is_held+0xb6/0x140 [ 935.870207] ? zap_class+0x460/0x460 [ 935.873916] ? __alloc_fd+0x430/0x530 [ 935.877726] do_filp_open+0x1a1/0x280 [ 935.881552] ? may_open_dev+0x100/0x100 [ 935.885547] ? kasan_check_read+0x11/0x20 [ 935.889692] ? do_raw_spin_unlock+0x57/0x270 [ 935.894096] ? _raw_spin_unlock+0x2d/0x50 [ 935.898241] ? __alloc_fd+0x430/0x530 [ 935.902039] do_sys_open+0x3fe/0x5d0 [ 935.905756] ? filp_open+0x80/0x80 [ 935.909315] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 935.914087] ? do_syscall_64+0x26/0x610 [ 935.918062] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.923446] ? do_syscall_64+0x26/0x610 [ 935.927407] __x64_sys_open+0x7e/0xc0 [ 935.931201] do_syscall_64+0x103/0x610 [ 935.935087] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 935.940262] RIP: 0033:0x457e39 [ 935.943445] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:15:30 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\n\x00'}, 0x1c) 20:15:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x2000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:30 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x36260000) 20:15:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 935.962329] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 935.970022] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 935.977274] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 935.984546] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 935.991806] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 935.999060] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:30 executing program 5 (fault-call:9 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:30 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x3c000000) 20:15:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0c0fe00000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 936.303782] FAULT_INJECTION: forcing a failure. [ 936.303782] name failslab, interval 1, probability 0, space 0, times 0 [ 936.351842] CPU: 1 PID: 4068 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 936.358888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 936.368247] Call Trace: [ 936.370854] dump_stack+0x172/0x1f0 [ 936.374505] should_fail.cold+0xa/0x1b [ 936.378418] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 936.383535] ? lock_downgrade+0x810/0x810 [ 936.387708] ? ___might_sleep+0x163/0x280 [ 936.391874] __should_failslab+0x121/0x190 [ 936.396123] should_failslab+0x9/0x14 [ 936.399964] __kmalloc+0x2dc/0x740 [ 936.403507] ? dput+0x1e6/0x6a0 [ 936.403526] ? exportfs_encode_inode_fh+0xb1/0x470 [ 936.403547] ? ovl_encode_real_fh+0x161/0x4c0 [ 936.403564] ovl_encode_real_fh+0x161/0x4c0 [ 936.420552] ? ovl_set_attr+0x280/0x280 [ 936.424547] ovl_get_index_name+0x1d/0x80 [ 936.428712] ovl_lookup_index+0xdc/0x610 [ 936.432785] ? kfree+0x173/0x230 [ 936.436156] ? ovl_lookup+0x16a5/0x1a10 [ 936.440147] ? ovl_get_index_fh+0x230/0x230 [ 936.444498] ? trace_hardirqs_on+0x67/0x230 20:15:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 936.448833] ? ovl_lookup+0x16a5/0x1a10 [ 936.452818] ovl_lookup+0x750/0x1a10 [ 936.456556] ? ovl_path_next+0x2e0/0x2e0 [ 936.460638] ? kasan_check_read+0x11/0x20 [ 936.464814] ? __d_lookup_rcu+0x6c0/0x6c0 [ 936.468971] ? __d_lookup+0x433/0x760 [ 936.472781] ? lookup_open+0x2c2/0x1b10 [ 936.476767] ? d_lookup+0xf9/0x260 [ 936.480320] ? lockdep_hardirqs_on+0x415/0x5d0 [ 936.480344] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 936.480361] ? d_lookup+0x19e/0x260 [ 936.489955] ? ovl_path_next+0x2e0/0x2e0 [ 936.489975] lookup_open+0x6d4/0x1b10 [ 936.490000] ? vfs_link+0xb60/0xb60 [ 936.505117] path_openat+0x1e95/0x4690 [ 936.509020] ? __lock_acquire+0x53b/0x4700 [ 936.513266] ? getname+0x1a/0x20 [ 936.516640] ? do_sys_open+0x2c9/0x5d0 [ 936.520564] ? check_preemption_disabled+0x48/0x290 [ 936.525585] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 936.530238] ? __lock_is_held+0xb6/0x140 [ 936.534295] ? zap_class+0x460/0x460 [ 936.538009] ? __alloc_fd+0x430/0x530 [ 936.541799] do_filp_open+0x1a1/0x280 [ 936.545586] ? may_open_dev+0x100/0x100 [ 936.549567] ? kasan_check_read+0x11/0x20 [ 936.553704] ? do_raw_spin_unlock+0x57/0x270 [ 936.558100] ? _raw_spin_unlock+0x2d/0x50 [ 936.562233] ? __alloc_fd+0x430/0x530 [ 936.566029] do_sys_open+0x3fe/0x5d0 [ 936.569743] ? filp_open+0x80/0x80 [ 936.573280] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 936.578025] ? do_syscall_64+0x26/0x610 [ 936.581984] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.587334] ? do_syscall_64+0x26/0x610 [ 936.591295] __x64_sys_open+0x7e/0xc0 [ 936.595085] do_syscall_64+0x103/0x610 [ 936.598965] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 936.604138] RIP: 0033:0x457e39 [ 936.607314] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 936.626198] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 936.633892] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 936.641162] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 936.648422] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 936.655687] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 936.662943] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:31 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000e00"}, 0x1c) 20:15:31 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x3f000000) 20:15:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a0") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:31 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:31 executing program 5 (fault-call:9 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:31 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x8bffffff) 20:15:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 936.994136] FAULT_INJECTION: forcing a failure. [ 936.994136] name failslab, interval 1, probability 0, space 0, times 0 20:15:31 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x5000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 937.039161] CPU: 1 PID: 4097 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 937.046216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.055577] Call Trace: [ 937.058187] dump_stack+0x172/0x1f0 [ 937.061819] should_fail.cold+0xa/0x1b [ 937.065702] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 937.070799] ? lock_downgrade+0x810/0x810 [ 937.074947] ? ___might_sleep+0x163/0x280 [ 937.079099] __should_failslab+0x121/0x190 [ 937.083329] should_failslab+0x9/0x14 [ 937.087119] __kmalloc+0x2dc/0x740 [ 937.090648] ? ovl_encode_real_fh+0x374/0x4c0 [ 937.095151] ? ovl_set_attr+0x280/0x280 [ 937.099133] ? ovl_get_index_name_fh+0x59/0x190 [ 937.103789] ovl_get_index_name_fh+0x59/0x190 [ 937.108274] ovl_get_index_name+0x48/0x80 [ 937.112410] ovl_lookup_index+0xdc/0x610 [ 937.116458] ? kfree+0x173/0x230 [ 937.119813] ? ovl_lookup+0x16a5/0x1a10 [ 937.123777] ? ovl_get_index_fh+0x230/0x230 [ 937.128097] ? trace_hardirqs_on+0x67/0x230 [ 937.132419] ? ovl_lookup+0x16a5/0x1a10 [ 937.136400] ovl_lookup+0x750/0x1a10 [ 937.140112] ? ovl_path_next+0x2e0/0x2e0 [ 937.144163] ? kasan_check_read+0x11/0x20 [ 937.148322] ? __d_lookup_rcu+0x6c0/0x6c0 [ 937.152463] ? __d_lookup+0x433/0x760 [ 937.156251] ? lookup_open+0x2c2/0x1b10 [ 937.160210] ? d_lookup+0xf9/0x260 [ 937.163740] ? lockdep_hardirqs_on+0x415/0x5d0 [ 937.168314] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 937.173316] ? d_lookup+0x19e/0x260 [ 937.176934] ? ovl_path_next+0x2e0/0x2e0 [ 937.180985] lookup_open+0x6d4/0x1b10 [ 937.184779] ? vfs_link+0xb60/0xb60 [ 937.188408] path_openat+0x1e95/0x4690 [ 937.192284] ? __lock_acquire+0x53b/0x4700 [ 937.196520] ? getname+0x1a/0x20 [ 937.199877] ? do_sys_open+0x2c9/0x5d0 [ 937.203755] ? check_preemption_disabled+0x48/0x290 [ 937.208762] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 937.213416] ? __lock_is_held+0xb6/0x140 [ 937.217551] ? zap_class+0x460/0x460 [ 937.221252] ? __alloc_fd+0x430/0x530 [ 937.225040] do_filp_open+0x1a1/0x280 [ 937.228828] ? may_open_dev+0x100/0x100 [ 937.232814] ? kasan_check_read+0x11/0x20 [ 937.236949] ? do_raw_spin_unlock+0x57/0x270 [ 937.241347] ? _raw_spin_unlock+0x2d/0x50 [ 937.245482] ? __alloc_fd+0x430/0x530 [ 937.249275] do_sys_open+0x3fe/0x5d0 [ 937.252990] ? filp_open+0x80/0x80 [ 937.256533] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 937.261275] ? do_syscall_64+0x26/0x610 [ 937.265235] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.270585] ? do_syscall_64+0x26/0x610 [ 937.274554] __x64_sys_open+0x7e/0xc0 [ 937.278359] do_syscall_64+0x103/0x610 [ 937.282250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.287438] RIP: 0033:0x457e39 [ 937.290618] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 937.309503] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 937.317209] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 937.324475] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 937.331734] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 20:15:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 937.339016] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 937.346316] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:32 executing program 5 (fault-call:9 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 937.404720] validate_nla: 9 callbacks suppressed [ 937.404729] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 937.438256] overlayfs: failed to resolve './file1': -2 20:15:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 937.647727] FAULT_INJECTION: forcing a failure. [ 937.647727] name failslab, interval 1, probability 0, space 0, times 0 [ 937.661009] CPU: 0 PID: 4124 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 937.668049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 937.677389] Call Trace: [ 937.679985] dump_stack+0x172/0x1f0 [ 937.683652] should_fail.cold+0xa/0x1b [ 937.687571] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 937.692682] ? lock_downgrade+0x810/0x810 [ 937.696832] ? ___might_sleep+0x163/0x280 [ 937.700985] __should_failslab+0x121/0x190 [ 937.705232] should_failslab+0x9/0x14 [ 937.709052] __kmalloc+0x2dc/0x740 [ 937.712586] ? ovl_get_index_fh+0x230/0x230 [ 937.716896] ? ovl_alloc_entry+0x25/0x70 [ 937.720951] ovl_alloc_entry+0x25/0x70 [ 937.724853] ovl_lookup+0x77f/0x1a10 [ 937.728578] ? ovl_path_next+0x2e0/0x2e0 [ 937.732632] ? kasan_check_read+0x11/0x20 [ 937.736772] ? __d_lookup_rcu+0x6c0/0x6c0 [ 937.740914] ? __d_lookup+0x433/0x760 [ 937.744724] ? lookup_open+0x2c2/0x1b10 [ 937.748712] ? d_lookup+0xf9/0x260 [ 937.752252] ? lockdep_hardirqs_on+0x415/0x5d0 [ 937.756827] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 937.761830] ? d_lookup+0x19e/0x260 [ 937.765459] ? ovl_path_next+0x2e0/0x2e0 [ 937.769531] lookup_open+0x6d4/0x1b10 [ 937.773373] ? vfs_link+0xb60/0xb60 [ 937.777040] path_openat+0x1e95/0x4690 [ 937.780927] ? __lock_acquire+0x53b/0x4700 [ 937.785192] ? getname+0x1a/0x20 [ 937.788560] ? do_sys_open+0x2c9/0x5d0 [ 937.792454] ? check_preemption_disabled+0x48/0x290 [ 937.797462] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 937.802119] ? __lock_is_held+0xb6/0x140 [ 937.806178] ? zap_class+0x460/0x460 [ 937.809896] ? __alloc_fd+0x430/0x530 [ 937.813716] do_filp_open+0x1a1/0x280 [ 937.817530] ? may_open_dev+0x100/0x100 [ 937.821502] ? kasan_check_read+0x11/0x20 [ 937.825685] ? do_raw_spin_unlock+0x57/0x270 [ 937.830094] ? _raw_spin_unlock+0x2d/0x50 [ 937.834236] ? __alloc_fd+0x430/0x530 [ 937.838056] do_sys_open+0x3fe/0x5d0 [ 937.841790] ? filp_open+0x80/0x80 [ 937.845332] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 937.850098] ? do_syscall_64+0x26/0x610 [ 937.854084] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.859460] ? do_syscall_64+0x26/0x610 [ 937.863437] __x64_sys_open+0x7e/0xc0 [ 937.867254] do_syscall_64+0x103/0x610 [ 937.871150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 937.876335] RIP: 0033:0x457e39 [ 937.879523] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:15:32 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00 \x00'}, 0x1c) 20:15:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:32 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x8cffffff) 20:15:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 937.898431] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 937.906130] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 937.913443] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 937.920728] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 937.927984] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 937.935247] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:32 executing program 5 (fault-call:9 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 937.999545] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 938.009149] overlayfs: failed to resolve './file1': -2 20:15:32 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xa1ffffff) 20:15:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x8000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(0x0, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 938.204055] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 938.218981] FAULT_INJECTION: forcing a failure. [ 938.218981] name failslab, interval 1, probability 0, space 0, times 0 [ 938.241796] CPU: 1 PID: 4147 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 938.248833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 938.258225] Call Trace: [ 938.260829] dump_stack+0x172/0x1f0 [ 938.264474] should_fail.cold+0xa/0x1b [ 938.268367] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 938.273475] ? lock_downgrade+0x810/0x810 [ 938.277631] ? ___might_sleep+0x163/0x280 [ 938.281803] __should_failslab+0x121/0x190 [ 938.286061] should_failslab+0x9/0x14 [ 938.286314] overlayfs: failed to resolve './file1': -2 [ 938.290273] kmem_cache_alloc+0x2be/0x710 20:15:33 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xe4ffffff) [ 938.299707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 938.305258] ? fsnotify+0x395/0xbd0 [ 938.308902] __alloc_file+0x27/0x300 [ 938.312626] alloc_empty_file_noaccount+0x1e/0x90 [ 938.317485] open_with_fake_path+0x27/0xe0 [ 938.321752] ovl_open_realfile+0xd1/0x120 [ 938.325907] ovl_open+0x11b/0x270 [ 938.329348] do_dentry_open+0x47d/0x1130 [ 938.333405] ? ovl_llseek+0x110/0x110 [ 938.337200] ? chown_common+0x5c0/0x5c0 [ 938.341194] ? inode_permission+0xb4/0x570 [ 938.345477] vfs_open+0xa0/0xd0 [ 938.348761] path_openat+0x10d7/0x4690 [ 938.352651] ? __lock_acquire+0x53b/0x4700 [ 938.356880] ? getname+0x1a/0x20 [ 938.360235] ? do_sys_open+0x2c9/0x5d0 [ 938.364120] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 938.368778] ? zap_class+0x460/0x460 [ 938.372496] ? __alloc_fd+0x430/0x530 [ 938.376348] do_filp_open+0x1a1/0x280 [ 938.380147] ? may_open_dev+0x100/0x100 [ 938.384134] ? kasan_check_read+0x11/0x20 [ 938.388289] ? do_raw_spin_unlock+0x57/0x270 [ 938.392692] ? _raw_spin_unlock+0x2d/0x50 [ 938.396845] ? __alloc_fd+0x430/0x530 [ 938.400649] do_sys_open+0x3fe/0x5d0 [ 938.404370] ? filp_open+0x80/0x80 [ 938.407900] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 938.412642] ? do_syscall_64+0x26/0x610 [ 938.416607] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 938.421953] ? do_syscall_64+0x26/0x610 [ 938.425915] __x64_sys_open+0x7e/0xc0 [ 938.429731] do_syscall_64+0x103/0x610 [ 938.433623] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 938.438826] RIP: 0033:0x457e39 20:15:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xa000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 938.442005] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 938.460902] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 938.468613] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 938.475883] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 938.483147] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 938.490397] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 938.497669] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:33 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00?\x00'}, 0x1c) 20:15:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000020000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:33 executing program 5 (fault-call:9 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xe000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:33 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xe7fd0000) [ 938.959545] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xf000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:33 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xf4ffffff) [ 939.031360] FAULT_INJECTION: forcing a failure. [ 939.031360] name failslab, interval 1, probability 0, space 0, times 0 20:15:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 939.102511] CPU: 1 PID: 4170 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 939.109566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.118935] Call Trace: [ 939.121534] dump_stack+0x172/0x1f0 [ 939.125177] should_fail.cold+0xa/0x1b [ 939.129071] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 939.134187] ? lock_downgrade+0x810/0x810 [ 939.138345] ? ___might_sleep+0x163/0x280 [ 939.142512] __should_failslab+0x121/0x190 [ 939.146754] should_failslab+0x9/0x14 [ 939.150561] kmem_cache_alloc_trace+0x2d1/0x760 [ 939.155231] ? ___might_sleep+0x163/0x280 [ 939.159389] ? __might_sleep+0x95/0x190 [ 939.163376] apparmor_file_alloc_security+0x112/0x940 [ 939.168568] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 939.174114] security_file_alloc+0x69/0xb0 [ 939.178367] __alloc_file+0xac/0x300 [ 939.182091] alloc_empty_file_noaccount+0x1e/0x90 [ 939.186949] open_with_fake_path+0x27/0xe0 [ 939.191195] ovl_open_realfile+0xd1/0x120 [ 939.195352] ovl_open+0x11b/0x270 [ 939.198813] do_dentry_open+0x47d/0x1130 [ 939.202879] ? ovl_llseek+0x110/0x110 [ 939.206858] ? chown_common+0x5c0/0x5c0 [ 939.210839] ? inode_permission+0xb4/0x570 [ 939.215081] vfs_open+0xa0/0xd0 [ 939.218367] path_openat+0x10d7/0x4690 [ 939.222259] ? __lock_acquire+0x53b/0x4700 [ 939.226494] ? getname+0x1a/0x20 [ 939.229857] ? do_sys_open+0x2c9/0x5d0 [ 939.233762] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 939.238436] ? zap_class+0x460/0x460 [ 939.242156] ? __alloc_fd+0x430/0x530 [ 939.245975] do_filp_open+0x1a1/0x280 [ 939.249783] ? may_open_dev+0x100/0x100 [ 939.253776] ? kasan_check_read+0x11/0x20 [ 939.257927] ? do_raw_spin_unlock+0x57/0x270 [ 939.262342] ? _raw_spin_unlock+0x2d/0x50 [ 939.266502] ? __alloc_fd+0x430/0x530 [ 939.270319] do_sys_open+0x3fe/0x5d0 [ 939.274044] ? filp_open+0x80/0x80 [ 939.277590] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 939.282350] ? do_syscall_64+0x26/0x610 [ 939.286326] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 939.291697] ? do_syscall_64+0x26/0x610 [ 939.295686] __x64_sys_open+0x7e/0xc0 [ 939.299494] do_syscall_64+0x103/0x610 [ 939.303398] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 939.308583] RIP: 0033:0x457e39 [ 939.311780] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 939.330684] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 939.338394] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 939.345681] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 939.352952] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 939.360220] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 939.367486] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:34 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xf5ffffff) [ 939.437736] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:34 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00@\x00'}, 0x1c) 20:15:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000040000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:34 executing program 5 (fault-call:9 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x10000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:34 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xf6ffffff) 20:15:34 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xfeffffff) [ 939.906469] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x18000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 939.995859] FAULT_INJECTION: forcing a failure. [ 939.995859] name failslab, interval 1, probability 0, space 0, times 0 [ 940.059349] CPU: 1 PID: 4211 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 940.066397] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.075753] Call Trace: [ 940.078361] dump_stack+0x172/0x1f0 [ 940.082007] should_fail.cold+0xa/0x1b [ 940.085925] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 940.087609] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 940.091040] ? ___might_sleep+0x163/0x280 [ 940.091077] __should_failslab+0x121/0x190 [ 940.091097] should_failslab+0x9/0x14 [ 940.091115] kmem_cache_alloc+0x2be/0x710 [ 940.114698] ? lock_acquire+0x16f/0x3f0 [ 940.118694] ? process_measurement+0x1540/0x1570 [ 940.123462] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 940.129022] integrity_inode_get+0x4e/0x260 [ 940.133357] process_measurement+0x2c7/0x1570 [ 940.137874] ? ima_add_template_entry.cold+0x48/0x48 [ 940.142981] ? zap_class+0x460/0x460 [ 940.146714] ? do_dentry_open+0x925/0x1130 [ 940.150957] ? lockdep_init_map+0x10c/0x5b0 [ 940.155292] ? aa_get_task_label+0x344/0x680 [ 940.159716] ? find_held_lock+0x35/0x130 [ 940.163790] ? aa_get_task_label+0x344/0x680 [ 940.168239] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 940.173807] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 940.179271] ? refcount_inc_checked+0x70/0x70 [ 940.183788] ? refcount_dec_and_test_checked+0x1b/0x20 [ 940.189062] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 940.194615] ? apparmor_task_getsecid+0x94/0xd0 [ 940.199296] ima_file_check+0xc5/0x110 [ 940.203191] ? process_measurement+0x1570/0x1570 [ 940.207954] ? inode_permission+0xb4/0x570 [ 940.212209] path_openat+0x1130/0x4690 [ 940.216100] ? __lock_acquire+0x53b/0x4700 [ 940.220333] ? getname+0x1a/0x20 [ 940.223700] ? do_sys_open+0x2c9/0x5d0 [ 940.227621] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 940.232297] ? zap_class+0x460/0x460 [ 940.236018] ? __alloc_fd+0x430/0x530 [ 940.239825] do_filp_open+0x1a1/0x280 [ 940.243635] ? may_open_dev+0x100/0x100 [ 940.247631] ? kasan_check_read+0x11/0x20 [ 940.251796] ? do_raw_spin_unlock+0x57/0x270 [ 940.256226] ? _raw_spin_unlock+0x2d/0x50 [ 940.260384] ? __alloc_fd+0x430/0x530 [ 940.264207] do_sys_open+0x3fe/0x5d0 [ 940.267927] ? filp_open+0x80/0x80 [ 940.271482] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 940.276241] ? do_syscall_64+0x26/0x610 [ 940.280216] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.285579] ? do_syscall_64+0x26/0x610 [ 940.289558] __x64_sys_open+0x7e/0xc0 [ 940.293376] do_syscall_64+0x103/0x610 [ 940.297270] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 940.302465] RIP: 0033:0x457e39 [ 940.305658] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 940.324570] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 940.332278] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 940.339543] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 940.346814] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 20:15:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:35 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xff010000) [ 940.354079] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 940.361344] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 940.409637] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:35 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00`\x00'}, 0x1c) 20:15:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, 0x0, &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:35 executing program 5 (fault-call:9 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x18100000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:35 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xff0f0000) [ 940.818748] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x20000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 940.861650] FAULT_INJECTION: forcing a failure. [ 940.861650] name failslab, interval 1, probability 0, space 0, times 0 [ 940.906191] CPU: 0 PID: 4248 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 940.913225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 940.922584] Call Trace: [ 940.925190] dump_stack+0x172/0x1f0 [ 940.928842] should_fail.cold+0xa/0x1b [ 940.932764] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 940.932806] ? ___might_sleep+0x163/0x280 [ 940.942073] __should_failslab+0x121/0x190 [ 940.946319] should_failslab+0x9/0x14 [ 940.946336] kmem_cache_alloc+0x2be/0x710 [ 940.946356] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 940.946372] ? ext4_sb_bread+0x116/0x290 [ 940.946393] mb_cache_entry_create+0xc1/0x950 [ 940.968431] ext4_xattr_get+0x5ad/0xa00 [ 940.972438] ? ext4_xattr_ibody_get+0x540/0x540 [ 940.977126] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 940.982171] ? ext4_xattr_security_set+0x40/0x40 [ 940.986938] ext4_xattr_security_get+0x32/0x40 [ 940.991545] __vfs_getxattr+0xf0/0x150 [ 940.995439] ? __vfs_setxattr+0x190/0x190 [ 940.999590] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.005132] ? security_inode_getsecurity+0xfb/0x130 [ 941.010248] vfs_getxattr+0x264/0x2a0 [ 941.014057] ? xattr_permission+0x300/0x300 [ 941.018385] ? selinux_is_enabled+0x43/0x60 [ 941.022713] ? kasan_check_write+0x14/0x20 [ 941.026956] ? override_creds+0x116/0x140 [ 941.031111] ovl_xattr_get+0x79/0xc0 [ 941.034843] ovl_other_xattr_get+0x35/0x40 [ 941.039118] vfs_getxattr_alloc+0x1c9/0x3b0 [ 941.043457] ? ovl_other_xattr_set+0x50/0x50 [ 941.047881] ? path_setxattr+0x1b0/0x1b0 [ 941.051955] ? lock_downgrade+0x810/0x810 [ 941.056118] ima_read_xattr+0x31/0x60 [ 941.059923] process_measurement+0xe93/0x1570 [ 941.064433] ? ima_add_template_entry.cold+0x48/0x48 [ 941.069549] ? zap_class+0x460/0x460 [ 941.073266] ? do_dentry_open+0x925/0x1130 [ 941.077498] ? lockdep_init_map+0x10c/0x5b0 [ 941.081828] ? aa_get_task_label+0x344/0x680 [ 941.086247] ? find_held_lock+0x35/0x130 [ 941.090310] ? aa_get_task_label+0x344/0x680 [ 941.094739] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.100315] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 941.105770] ? refcount_inc_checked+0x70/0x70 [ 941.110278] ? refcount_dec_and_test_checked+0x1b/0x20 [ 941.115552] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 941.121089] ? apparmor_task_getsecid+0x94/0xd0 [ 941.125770] ima_file_check+0xc5/0x110 [ 941.129661] ? process_measurement+0x1570/0x1570 [ 941.134432] ? inode_permission+0xb4/0x570 [ 941.138692] path_openat+0x1130/0x4690 [ 941.142623] ? __lock_acquire+0x53b/0x4700 [ 941.146859] ? getname+0x1a/0x20 [ 941.150224] ? do_sys_open+0x2c9/0x5d0 [ 941.154134] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 941.158809] ? zap_class+0x460/0x460 [ 941.162527] ? __alloc_fd+0x430/0x530 [ 941.166334] do_filp_open+0x1a1/0x280 [ 941.170140] ? may_open_dev+0x100/0x100 [ 941.174137] ? kasan_check_read+0x11/0x20 [ 941.178289] ? do_raw_spin_unlock+0x57/0x270 [ 941.182705] ? _raw_spin_unlock+0x2d/0x50 [ 941.186854] ? __alloc_fd+0x430/0x530 [ 941.190689] do_sys_open+0x3fe/0x5d0 [ 941.194410] ? filp_open+0x80/0x80 [ 941.197958] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 941.202729] ? do_syscall_64+0x26/0x610 [ 941.206714] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.212076] ? do_syscall_64+0x26/0x610 [ 941.216056] __x64_sys_open+0x7e/0xc0 [ 941.219862] do_syscall_64+0x103/0x610 [ 941.223757] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 941.228943] RIP: 0033:0x457e39 [ 941.232139] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:15:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 941.251039] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 941.258743] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 941.266008] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 941.273294] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 941.280564] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 941.287832] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:36 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xff1c0100) [ 941.301855] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3a7d0900}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:36 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000fe8000"}, 0x1c) 20:15:36 executing program 5 (fault-call:9 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:36 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xfffff000) 20:15:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3c000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:36 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xffffff7f) [ 941.793544] FAULT_INJECTION: forcing a failure. [ 941.793544] name failslab, interval 1, probability 0, space 0, times 0 [ 941.850573] CPU: 0 PID: 4289 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 941.857614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 941.857635] Call Trace: [ 941.857679] dump_stack+0x172/0x1f0 [ 941.857708] should_fail.cold+0xa/0x1b [ 941.857730] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 941.857755] ? ___might_sleep+0x163/0x280 [ 941.857782] __should_failslab+0x121/0x190 [ 941.857804] should_failslab+0x9/0x14 [ 941.857820] __kmalloc_track_caller+0x2d8/0x740 [ 941.857843] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 941.857869] ? revert_creds+0x130/0x170 [ 941.891222] ? ovl_xattr_get+0x88/0xc0 [ 941.891238] ? vfs_getxattr_alloc+0x26e/0x3b0 [ 941.891258] krealloc+0x66/0xd0 [ 941.891277] vfs_getxattr_alloc+0x26e/0x3b0 [ 941.909222] ? path_setxattr+0x1b0/0x1b0 [ 941.909239] ? lock_downgrade+0x810/0x810 [ 941.909268] ima_read_xattr+0x31/0x60 [ 941.909285] process_measurement+0xe93/0x1570 [ 941.917660] ? ima_add_template_entry.cold+0x48/0x48 [ 941.946804] ? zap_class+0x460/0x460 [ 941.950533] ? do_dentry_open+0x925/0x1130 [ 941.954774] ? lockdep_init_map+0x10c/0x5b0 [ 941.959120] ? aa_get_task_label+0x344/0x680 [ 941.963543] ? find_held_lock+0x35/0x130 [ 941.967619] ? aa_get_task_label+0x344/0x680 [ 941.972048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 941.977599] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 941.983061] ? refcount_inc_checked+0x70/0x70 [ 941.987584] ? refcount_dec_and_test_checked+0x1b/0x20 [ 941.992865] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 941.998409] ? apparmor_task_getsecid+0x94/0xd0 [ 942.003092] ima_file_check+0xc5/0x110 [ 942.006994] ? process_measurement+0x1570/0x1570 [ 942.011763] ? inode_permission+0xb4/0x570 [ 942.016024] path_openat+0x1130/0x4690 [ 942.019921] ? __lock_acquire+0x53b/0x4700 [ 942.024164] ? getname+0x1a/0x20 [ 942.027543] ? do_sys_open+0x2c9/0x5d0 [ 942.031461] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 942.036152] ? zap_class+0x460/0x460 [ 942.039893] ? __alloc_fd+0x430/0x530 [ 942.043713] do_filp_open+0x1a1/0x280 [ 942.047520] ? may_open_dev+0x100/0x100 [ 942.051515] ? kasan_check_read+0x11/0x20 [ 942.055689] ? do_raw_spin_unlock+0x57/0x270 [ 942.060113] ? _raw_spin_unlock+0x2d/0x50 [ 942.064261] ? __alloc_fd+0x430/0x530 [ 942.068081] do_sys_open+0x3fe/0x5d0 [ 942.071800] ? filp_open+0x80/0x80 [ 942.075352] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 942.080125] ? do_syscall_64+0x26/0x610 [ 942.084125] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.089516] ? do_syscall_64+0x26/0x610 [ 942.093528] __x64_sys_open+0x7e/0xc0 [ 942.097337] do_syscall_64+0x103/0x610 [ 942.101244] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 942.106429] RIP: 0033:0x457e39 [ 942.109625] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 942.128528] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 942.136237] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 942.143502] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 20:15:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3f000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d00000000c0000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 942.150768] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 942.158036] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 942.165301] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:37 executing program 5 (fault-call:9 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:37 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000fec000"}, 0x1c) 20:15:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:37 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x40000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:37 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xffffff8b) [ 942.609727] validate_nla: 5 callbacks suppressed [ 942.609736] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 942.644290] overlayfs: missing 'lowerdir' 20:15:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000100000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:37 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xffffff8c) [ 942.692801] FAULT_INJECTION: forcing a failure. [ 942.692801] name failslab, interval 1, probability 0, space 0, times 0 [ 942.747708] CPU: 0 PID: 4327 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 942.754746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 942.764102] Call Trace: [ 942.766721] dump_stack+0x172/0x1f0 [ 942.770372] should_fail.cold+0xa/0x1b [ 942.774270] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 942.779395] ? ___might_sleep+0x163/0x280 [ 942.783538] __should_failslab+0x121/0x190 [ 942.787770] should_failslab+0x9/0x14 [ 942.791566] kmem_cache_alloc+0x2be/0x710 20:15:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 942.795717] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 942.800349] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 942.801253] ? ext4_sb_bread+0x116/0x290 [ 942.801276] mb_cache_entry_create+0xc1/0x950 [ 942.801305] ext4_xattr_get+0x5ad/0xa00 [ 942.822824] ? ext4_xattr_ibody_get+0x540/0x540 [ 942.827508] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 942.832535] ? ext4_xattr_security_set+0x40/0x40 [ 942.837300] ext4_xattr_security_get+0x32/0x40 [ 942.841891] __vfs_getxattr+0xf0/0x150 [ 942.845792] ? __vfs_setxattr+0x190/0x190 [ 942.849953] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 942.855513] ? security_inode_getsecurity+0xfb/0x130 [ 942.860658] vfs_getxattr+0x264/0x2a0 [ 942.864708] ? xattr_permission+0x300/0x300 [ 942.869045] ? selinux_is_enabled+0x43/0x60 [ 942.871704] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 942.873381] ? kasan_check_write+0x14/0x20 [ 942.873401] ? override_creds+0x116/0x140 [ 942.873421] ovl_xattr_get+0x79/0xc0 [ 942.873443] ovl_other_xattr_get+0x35/0x40 20:15:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 942.873461] vfs_getxattr_alloc+0x2ee/0x3b0 [ 942.873481] ? path_setxattr+0x1b0/0x1b0 [ 942.873497] ? lock_downgrade+0x810/0x810 [ 942.873524] ima_read_xattr+0x31/0x60 [ 942.906775] overlayfs: missing 'lowerdir' [ 942.909566] process_measurement+0xe93/0x1570 [ 942.909595] ? ima_add_template_entry.cold+0x48/0x48 [ 942.909608] ? zap_class+0x460/0x460 [ 942.909628] ? do_dentry_open+0x925/0x1130 [ 942.922054] ? lockdep_init_map+0x10c/0x5b0 [ 942.939390] ? aa_get_task_label+0x344/0x680 [ 942.943808] ? find_held_lock+0x35/0x130 20:15:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 942.943827] ? aa_get_task_label+0x344/0x680 [ 942.943852] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 942.943871] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 942.943889] ? refcount_inc_checked+0x70/0x70 [ 942.943915] ? refcount_dec_and_test_checked+0x1b/0x20 [ 942.973067] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 942.978629] ? apparmor_task_getsecid+0x94/0xd0 [ 942.983374] ima_file_check+0xc5/0x110 [ 942.987281] ? process_measurement+0x1570/0x1570 [ 942.992067] ? inode_permission+0xb4/0x570 [ 942.996329] path_openat+0x1130/0x4690 [ 943.000233] ? __lock_acquire+0x53b/0x4700 [ 943.004481] ? getname+0x1a/0x20 [ 943.007863] ? do_sys_open+0x2c9/0x5d0 [ 943.011009] overlayfs: missing 'lowerdir' [ 943.011779] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 943.011799] ? zap_class+0x460/0x460 [ 943.011819] ? __alloc_fd+0x430/0x530 [ 943.011839] do_filp_open+0x1a1/0x280 [ 943.031951] ? may_open_dev+0x100/0x100 [ 943.035955] ? kasan_check_read+0x11/0x20 [ 943.040115] ? do_raw_spin_unlock+0x57/0x270 [ 943.044525] ? _raw_spin_unlock+0x2d/0x50 [ 943.047690] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 943.048689] ? __alloc_fd+0x430/0x530 [ 943.048735] do_sys_open+0x3fe/0x5d0 [ 943.063503] ? filp_open+0x80/0x80 [ 943.067074] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 943.071856] ? do_syscall_64+0x26/0x610 [ 943.075856] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.081230] ? do_syscall_64+0x26/0x610 [ 943.081252] __x64_sys_open+0x7e/0xc0 [ 943.081271] do_syscall_64+0x103/0x610 [ 943.081290] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.089051] RIP: 0033:0x457e39 [ 943.089075] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 943.089088] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 943.127919] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 943.135187] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 943.142442] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 943.149704] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 943.156971] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:37 executing program 5 (fault-call:9 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 943.332354] FAULT_INJECTION: forcing a failure. [ 943.332354] name failslab, interval 1, probability 0, space 0, times 0 [ 943.344634] CPU: 0 PID: 4355 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 943.351686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.361023] Call Trace: [ 943.363621] dump_stack+0x172/0x1f0 [ 943.367260] should_fail.cold+0xa/0x1b [ 943.371163] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 943.376256] ? lock_downgrade+0x810/0x810 [ 943.380408] ? ___might_sleep+0x163/0x280 [ 943.384575] __should_failslab+0x121/0x190 [ 943.388805] should_failslab+0x9/0x14 [ 943.392601] __kmalloc+0x2dc/0x740 [ 943.396135] ? kasan_check_write+0x14/0x20 [ 943.400356] ? up_read+0x131/0x180 [ 943.403896] ? crypto_create_tfm+0x88/0x310 [ 943.408219] crypto_create_tfm+0x88/0x310 [ 943.412355] ? crypto_alg_mod_lookup+0xff/0x550 [ 943.417030] crypto_alloc_tfm+0x104/0x2f0 [ 943.421187] crypto_alloc_shash+0x2d/0x40 [ 943.425337] ima_alloc_tfm+0xa9/0xf0 [ 943.429046] ima_calc_file_hash+0x178/0x570 [ 943.433370] ima_collect_measurement+0x50f/0x5c0 [ 943.438128] ? ima_get_action+0xa0/0xa0 [ 943.442112] process_measurement+0xeca/0x1570 [ 943.446640] ? ima_add_template_entry.cold+0x48/0x48 [ 943.451798] ? zap_class+0x460/0x460 [ 943.455501] ? do_dentry_open+0x925/0x1130 [ 943.459719] ? lockdep_init_map+0x10c/0x5b0 [ 943.464043] ? aa_get_task_label+0x344/0x680 [ 943.468448] ? find_held_lock+0x35/0x130 [ 943.472502] ? aa_get_task_label+0x344/0x680 [ 943.476899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 943.482424] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 943.487862] ? refcount_inc_checked+0x70/0x70 [ 943.492349] ? refcount_dec_and_test_checked+0x1b/0x20 [ 943.497621] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 943.503151] ? apparmor_task_getsecid+0x94/0xd0 [ 943.507809] ima_file_check+0xc5/0x110 [ 943.511705] ? process_measurement+0x1570/0x1570 [ 943.516462] ? inode_permission+0xb4/0x570 [ 943.520704] path_openat+0x1130/0x4690 [ 943.524600] ? __lock_acquire+0x53b/0x4700 [ 943.528827] ? getname+0x1a/0x20 [ 943.532197] ? do_sys_open+0x2c9/0x5d0 [ 943.536081] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 943.540736] ? zap_class+0x460/0x460 [ 943.544465] ? __alloc_fd+0x430/0x530 [ 943.548268] do_filp_open+0x1a1/0x280 [ 943.552057] ? may_open_dev+0x100/0x100 [ 943.556027] ? kasan_check_read+0x11/0x20 [ 943.560161] ? do_raw_spin_unlock+0x57/0x270 [ 943.564574] ? _raw_spin_unlock+0x2d/0x50 [ 943.568716] ? __alloc_fd+0x430/0x530 [ 943.572509] do_sys_open+0x3fe/0x5d0 [ 943.576243] ? filp_open+0x80/0x80 [ 943.579791] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 943.584557] ? do_syscall_64+0x26/0x610 [ 943.588530] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.593897] ? do_syscall_64+0x26/0x610 [ 943.597896] __x64_sys_open+0x7e/0xc0 [ 943.601701] do_syscall_64+0x103/0x610 [ 943.605590] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 943.610778] RIP: 0033:0x457e39 [ 943.613975] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 943.632877] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 943.640569] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 943.647824] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 943.655087] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 943.662391] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 943.669660] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:38 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000000fc00"}, 0x1c) 20:15:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:38 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x43000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 943.680442] ima: Can not allocate md5 (reason: -12) [ 943.686806] audit: type=1800 audit(1549397738.417:137): pid=4355 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor5" name="file1" dev="overlay" ino=148847 res=0 20:15:38 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xffffffa1) 20:15:38 executing program 5 (fault-call:9 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 943.790993] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 943.795736] overlayfs: missing 'lowerdir' 20:15:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:38 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xffffffe4) 20:15:38 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x48000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 943.880015] FAULT_INJECTION: forcing a failure. [ 943.880015] name failslab, interval 1, probability 0, space 0, times 0 [ 943.912237] CPU: 1 PID: 4370 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 943.919269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 943.919275] Call Trace: [ 943.919302] dump_stack+0x172/0x1f0 [ 943.919327] should_fail.cold+0xa/0x1b [ 943.919346] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 943.919364] ? kfree+0x173/0x230 [ 943.919385] ? ___might_sleep+0x163/0x280 [ 943.919409] __should_failslab+0x121/0x190 [ 943.919429] should_failslab+0x9/0x14 [ 943.919444] __kmalloc_track_caller+0x2d8/0x740 [ 943.919465] ? kzfree+0x29/0x30 [ 943.967390] ? crypto_destroy_tfm+0x15d/0x300 [ 943.971903] ? ima_collect_measurement+0x375/0x5c0 [ 943.976844] krealloc+0x66/0xd0 [ 943.980133] ima_collect_measurement+0x375/0x5c0 [ 943.984894] ? ovl_other_xattr_get+0x35/0x40 [ 943.989311] ? ima_get_action+0xa0/0xa0 [ 943.993309] process_measurement+0xeca/0x1570 [ 943.997822] ? ima_add_template_entry.cold+0x48/0x48 [ 944.002923] ? zap_class+0x460/0x460 [ 944.006639] ? do_dentry_open+0x925/0x1130 [ 944.010881] ? lockdep_init_map+0x10c/0x5b0 [ 944.015218] ? aa_get_task_label+0x344/0x680 [ 944.019632] ? find_held_lock+0x35/0x130 [ 944.023703] ? aa_get_task_label+0x344/0x680 [ 944.028301] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 944.033848] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 944.039305] ? refcount_inc_checked+0x70/0x70 [ 944.043818] ? refcount_dec_and_test_checked+0x1b/0x20 [ 944.049097] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 944.054637] ? apparmor_task_getsecid+0x94/0xd0 [ 944.059347] ima_file_check+0xc5/0x110 [ 944.063278] ? process_measurement+0x1570/0x1570 [ 944.068054] ? inode_permission+0xb4/0x570 [ 944.072311] path_openat+0x1130/0x4690 [ 944.076230] ? __lock_acquire+0x53b/0x4700 [ 944.080464] ? getname+0x1a/0x20 [ 944.083847] ? do_sys_open+0x2c9/0x5d0 [ 944.087754] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 944.092426] ? zap_class+0x460/0x460 [ 944.096150] ? __alloc_fd+0x430/0x530 [ 944.099964] do_filp_open+0x1a1/0x280 [ 944.103768] ? may_open_dev+0x100/0x100 [ 944.107759] ? kasan_check_read+0x11/0x20 [ 944.111910] ? do_raw_spin_unlock+0x57/0x270 [ 944.116320] ? _raw_spin_unlock+0x2d/0x50 [ 944.120465] ? __alloc_fd+0x430/0x530 [ 944.124282] do_sys_open+0x3fe/0x5d0 [ 944.127999] ? filp_open+0x80/0x80 [ 944.131546] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 944.136316] ? do_syscall_64+0x26/0x610 [ 944.140290] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.145677] ? do_syscall_64+0x26/0x610 [ 944.149671] __x64_sys_open+0x7e/0xc0 [ 944.153477] do_syscall_64+0x103/0x610 [ 944.157369] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 944.162571] RIP: 0033:0x457e39 [ 944.165764] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 944.184673] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 944.192381] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 944.199651] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 944.206925] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 944.214195] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 944.221461] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 944.239554] audit: type=1800 audit(1549397738.967:138): pid=4370 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor5" name="file1" dev="overlay" ino=149720 res=0 [ 944.265340] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 944.278570] overlayfs: missing 'lowerdir' 20:15:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d00000003f0000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 944.346257] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 944.412691] overlayfs: missing 'lowerdir' 20:15:39 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000080fe00"}, 0x1c) 20:15:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4c000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:39 executing program 5 (fault-call:9 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:39 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xfffffff4) [ 944.732631] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 944.752946] overlayfs: missing 'lowerdir' 20:15:39 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xfffffff5) [ 944.776449] FAULT_INJECTION: forcing a failure. [ 944.776449] name failslab, interval 1, probability 0, space 0, times 0 [ 944.796930] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 944.812405] CPU: 1 PID: 4403 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 944.819480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 944.828841] Call Trace: [ 944.831442] dump_stack+0x172/0x1f0 [ 944.835169] should_fail.cold+0xa/0x1b [ 944.839074] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 944.844423] ? lock_downgrade+0x810/0x810 [ 944.848577] ? ___might_sleep+0x163/0x280 [ 944.852740] __should_failslab+0x121/0x190 [ 944.856997] should_failslab+0x9/0x14 [ 944.860803] kmem_cache_alloc+0x2be/0x710 [ 944.865505] ima_d_path+0x52/0x1ee [ 944.869050] process_measurement+0x11dc/0x1570 [ 944.873645] ? ima_add_template_entry.cold+0x48/0x48 [ 944.878773] ? zap_class+0x460/0x460 [ 944.882512] ? do_dentry_open+0x925/0x1130 [ 944.886760] ? lockdep_init_map+0x10c/0x5b0 [ 944.891093] ? aa_get_task_label+0x344/0x680 [ 944.895506] ? find_held_lock+0x35/0x130 [ 944.899572] ? aa_get_task_label+0x344/0x680 [ 944.903996] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 944.909537] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 944.914990] ? refcount_inc_checked+0x70/0x70 [ 944.919981] ? refcount_dec_and_test_checked+0x1b/0x20 [ 944.925260] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 944.930800] ? apparmor_task_getsecid+0x94/0xd0 [ 944.935488] ima_file_check+0xc5/0x110 [ 944.939385] ? process_measurement+0x1570/0x1570 [ 944.944143] ? inode_permission+0xb4/0x570 [ 944.948396] path_openat+0x1130/0x4690 [ 944.952290] ? __lock_acquire+0x53b/0x4700 [ 944.956533] ? getname+0x1a/0x20 [ 944.959899] ? do_sys_open+0x2c9/0x5d0 [ 944.963824] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 944.968523] ? zap_class+0x460/0x460 [ 944.972243] ? __alloc_fd+0x430/0x530 [ 944.976054] do_filp_open+0x1a1/0x280 [ 944.979860] ? may_open_dev+0x100/0x100 [ 944.983849] ? kasan_check_read+0x11/0x20 [ 944.988001] ? do_raw_spin_unlock+0x57/0x270 [ 944.992426] ? _raw_spin_unlock+0x2d/0x50 [ 944.996574] ? __alloc_fd+0x430/0x530 [ 945.000391] do_sys_open+0x3fe/0x5d0 [ 945.004108] ? filp_open+0x80/0x80 [ 945.007657] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 945.012424] ? do_syscall_64+0x26/0x610 [ 945.016399] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.021764] ? do_syscall_64+0x26/0x610 [ 945.025767] __x64_sys_open+0x7e/0xc0 [ 945.029573] do_syscall_64+0x103/0x610 [ 945.033466] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.038653] RIP: 0033:0x457e39 [ 945.041875] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 945.060774] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 945.068481] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 20:15:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x50950900}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 945.075749] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 945.083023] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 945.090319] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 945.097590] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:39 executing program 5 (fault-call:9 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 945.237453] overlayfs: missing 'lowerdir' 20:15:40 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xfffffff6) [ 945.266746] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 945.324468] FAULT_INJECTION: forcing a failure. [ 945.324468] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 945.336308] CPU: 1 PID: 4424 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 945.343344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.352707] Call Trace: [ 945.355312] dump_stack+0x172/0x1f0 [ 945.358974] should_fail.cold+0xa/0x1b [ 945.362868] ? should_fail+0x14d/0x85c [ 945.366766] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 945.371874] ? debug_smp_processor_id+0x1c/0x20 [ 945.376544] ? perf_trace_lock+0xeb/0x510 [ 945.380699] ? mark_held_locks+0x100/0x100 [ 945.384942] should_fail_alloc_page+0x50/0x60 [ 945.389459] __alloc_pages_nodemask+0x1a1/0x710 [ 945.394144] ? __alloc_pages_slowpath+0x2900/0x2900 [ 945.399207] cache_grow_begin+0x9c/0x8c0 [ 945.403273] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 945.408817] ? check_preemption_disabled+0x48/0x290 [ 945.413842] kmem_cache_alloc+0x645/0x710 [ 945.418008] ima_d_path+0x52/0x1ee [ 945.421556] process_measurement+0x11dc/0x1570 [ 945.426163] ? ima_add_template_entry.cold+0x48/0x48 [ 945.431295] ? zap_class+0x460/0x460 [ 945.435027] ? do_dentry_open+0x925/0x1130 [ 945.439257] ? lockdep_init_map+0x10c/0x5b0 [ 945.443586] ? aa_get_task_label+0x344/0x680 [ 945.448001] ? find_held_lock+0x35/0x130 [ 945.452066] ? aa_get_task_label+0x344/0x680 [ 945.456501] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 945.462041] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 945.467498] ? refcount_inc_checked+0x70/0x70 [ 945.472012] ? refcount_dec_and_test_checked+0x1b/0x20 [ 945.477292] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 945.482837] ? apparmor_task_getsecid+0x94/0xd0 [ 945.487522] ima_file_check+0xc5/0x110 [ 945.491418] ? process_measurement+0x1570/0x1570 [ 945.496186] ? inode_permission+0xb4/0x570 [ 945.500433] path_openat+0x1130/0x4690 [ 945.504324] ? __lock_acquire+0x53b/0x4700 [ 945.508576] ? getname+0x1a/0x20 [ 945.511947] ? do_sys_open+0x2c9/0x5d0 [ 945.515852] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 945.520529] ? zap_class+0x460/0x460 [ 945.524251] ? __alloc_fd+0x430/0x530 [ 945.528058] do_filp_open+0x1a1/0x280 [ 945.531863] ? may_open_dev+0x100/0x100 [ 945.535852] ? kasan_check_read+0x11/0x20 [ 945.540026] ? do_raw_spin_unlock+0x57/0x270 [ 945.544440] ? _raw_spin_unlock+0x2d/0x50 [ 945.548592] ? __alloc_fd+0x430/0x530 [ 945.552412] do_sys_open+0x3fe/0x5d0 [ 945.556145] ? filp_open+0x80/0x80 [ 945.559705] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 945.564467] ? do_syscall_64+0x26/0x610 [ 945.568442] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.573811] ? do_syscall_64+0x26/0x610 [ 945.577791] __x64_sys_open+0x7e/0xc0 [ 945.581595] do_syscall_64+0x103/0x610 [ 945.585489] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 945.590685] RIP: 0033:0x457e39 [ 945.593882] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 945.612780] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 945.620487] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 945.627754] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 945.635021] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 945.642286] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 945.649554] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:40 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000c0fe00"}, 0x1c) 20:15:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x61000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d00000004c0000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:40 executing program 5 (fault-call:9 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 945.771947] overlayfs: missing 'lowerdir' [ 945.844726] FAULT_INJECTION: forcing a failure. [ 945.844726] name failslab, interval 1, probability 0, space 0, times 0 [ 945.861583] CPU: 1 PID: 4444 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 945.869115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 945.878473] Call Trace: [ 945.881076] dump_stack+0x172/0x1f0 [ 945.884730] should_fail.cold+0xa/0x1b [ 945.888635] ? fault_create_debugfs_attr+0x1e0/0x1e0 20:15:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x63000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:40 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xfffffffe) 20:15:40 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 945.893773] ? ___might_sleep+0x163/0x280 [ 945.897948] __should_failslab+0x121/0x190 [ 945.902209] should_failslab+0x9/0x14 [ 945.906019] __kmalloc+0x2dc/0x740 [ 945.906045] ? ima_alloc_init_template+0x65/0x3b0 [ 945.906063] ima_alloc_init_template+0x65/0x3b0 [ 945.914441] ima_store_measurement+0x1bc/0x3e0 [ 945.914461] ? ima_collect_measurement+0x5c0/0x5c0 [ 945.914479] ? kmem_cache_alloc+0x341/0x710 [ 945.914503] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 945.938531] ? ima_d_path+0xbf/0x1ee [ 945.938552] process_measurement+0x119e/0x1570 [ 945.938580] ? ima_add_template_entry.cold+0x48/0x48 [ 945.938596] ? zap_class+0x460/0x460 [ 945.951967] ? do_dentry_open+0x925/0x1130 [ 945.951981] ? lockdep_init_map+0x10c/0x5b0 [ 945.952003] ? aa_get_task_label+0x344/0x680 [ 945.952019] ? find_held_lock+0x35/0x130 [ 945.972708] ? aa_get_task_label+0x344/0x680 [ 945.977128] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 945.982683] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 945.988142] ? refcount_inc_checked+0x70/0x70 [ 945.992649] ? refcount_dec_and_test_checked+0x1b/0x20 [ 945.997941] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 946.003478] ? apparmor_task_getsecid+0x94/0xd0 [ 946.008161] ima_file_check+0xc5/0x110 [ 946.012056] ? process_measurement+0x1570/0x1570 [ 946.016826] ? inode_permission+0xb4/0x570 [ 946.021071] path_openat+0x1130/0x4690 [ 946.024961] ? __lock_acquire+0x53b/0x4700 [ 946.029199] ? getname+0x1a/0x20 [ 946.032585] ? do_sys_open+0x2c9/0x5d0 [ 946.036491] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 946.041163] ? zap_class+0x460/0x460 [ 946.044885] ? __alloc_fd+0x430/0x530 [ 946.048700] do_filp_open+0x1a1/0x280 [ 946.052523] ? may_open_dev+0x100/0x100 [ 946.056511] ? kasan_check_read+0x11/0x20 [ 946.060663] ? do_raw_spin_unlock+0x57/0x270 [ 946.065084] ? _raw_spin_unlock+0x2d/0x50 [ 946.069244] ? __alloc_fd+0x430/0x530 [ 946.073057] do_sys_open+0x3fe/0x5d0 [ 946.076776] ? filp_open+0x80/0x80 [ 946.080324] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 946.085079] ? do_syscall_64+0x26/0x610 [ 946.089109] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.094490] ? do_syscall_64+0x26/0x610 [ 946.098487] __x64_sys_open+0x7e/0xc0 [ 946.102307] do_syscall_64+0x103/0x610 [ 946.106204] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.111391] RIP: 0033:0x457e39 [ 946.114583] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 946.133484] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 20:15:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 946.141195] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 946.148464] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 946.155731] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 946.162996] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 946.170262] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 946.200504] audit: type=1804 audit(1549397740.927:139): pid=4444 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=add_template_measure cause=ENOMEM comm="syz-executor5" name="/root/syzkaller-testdir619555362/syzkaller.NiRR3t/302/file0/file1" dev="overlay" ino=149871 res=0 20:15:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 946.241633] overlayfs: unrecognized mount option "lowerdir" or missing value 20:15:41 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x10000000000) 20:15:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 946.423578] overlayfs: unrecognized mount option "lowerdir" or missing value 20:15:41 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000000ff00"}, 0x1c) 20:15:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x68000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000058650000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:41 executing program 5 (fault-call:9 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:41 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x20000000000000) [ 946.685397] overlayfs: unrecognized mount option "lowerdir" or missing value [ 946.725264] FAULT_INJECTION: forcing a failure. 20:15:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,wor']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000680000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 946.725264] name failslab, interval 1, probability 0, space 0, times 0 [ 946.743405] CPU: 0 PID: 4474 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 946.750437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 946.759790] Call Trace: [ 946.762397] dump_stack+0x172/0x1f0 [ 946.766045] should_fail.cold+0xa/0x1b [ 946.769944] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 946.775057] ? lock_downgrade+0x810/0x810 [ 946.779225] ? ___might_sleep+0x163/0x280 [ 946.783405] __should_failslab+0x121/0x190 [ 946.787704] should_failslab+0x9/0x14 [ 946.791528] __kmalloc+0x2dc/0x740 [ 946.795097] ? vsprintf+0x40/0x40 [ 946.798568] ? do_filp_open+0x1a1/0x280 [ 946.802561] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 946.807959] ? debug_smp_processor_id+0x1c/0x20 [ 946.812655] ? ima_write_template_field_data.isra.0+0x56/0x210 [ 946.818688] ima_write_template_field_data.isra.0+0x56/0x210 [ 946.821378] overlayfs: unrecognized mount option "wor" or missing value 20:15:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 946.824510] ima_eventdigest_init_common+0x126/0x250 [ 946.824527] ? prepend_path.isra.0+0xb17/0xfb0 [ 946.824546] ? ima_write_template_field_data.isra.0+0x210/0x210 [ 946.824589] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 946.824606] ? rcu_read_lock_sched_held+0x110/0x130 [ 946.858031] ? __kmalloc+0x5d5/0x740 [ 946.861761] ima_eventdigest_ng_init+0x60/0x150 [ 946.866628] ima_alloc_init_template+0x255/0x3b0 [ 946.871423] ima_store_measurement+0x1bc/0x3e0 [ 946.876019] ? ima_collect_measurement+0x5c0/0x5c0 [ 946.880958] ? kmem_cache_alloc+0x341/0x710 20:15:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,wor']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 946.885301] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 946.890873] ? ima_d_path+0xbf/0x1ee [ 946.894602] process_measurement+0x119e/0x1570 [ 946.899207] ? ima_add_template_entry.cold+0x48/0x48 [ 946.904319] ? zap_class+0x460/0x460 [ 946.908052] ? do_dentry_open+0x925/0x1130 [ 946.912295] ? lockdep_init_map+0x10c/0x5b0 [ 946.916631] ? aa_get_task_label+0x344/0x680 [ 946.921057] ? find_held_lock+0x35/0x130 [ 946.925130] ? aa_get_task_label+0x344/0x680 [ 946.929564] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 20:15:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 946.930913] overlayfs: unrecognized mount option "wor" or missing value [ 946.935114] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 946.935134] ? refcount_inc_checked+0x70/0x70 [ 946.935164] ? refcount_dec_and_test_checked+0x1b/0x20 [ 946.935178] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 946.935196] ? apparmor_task_getsecid+0x94/0xd0 [ 946.935217] ima_file_check+0xc5/0x110 [ 946.935233] ? process_measurement+0x1570/0x1570 [ 946.976005] ? inode_permission+0xb4/0x570 [ 946.980283] path_openat+0x1130/0x4690 [ 946.984185] ? __lock_acquire+0x53b/0x4700 [ 946.988430] ? getname+0x1a/0x20 [ 946.991802] ? do_sys_open+0x2c9/0x5d0 [ 946.995730] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 947.000416] ? zap_class+0x460/0x460 [ 947.004145] ? __alloc_fd+0x430/0x530 [ 947.007967] do_filp_open+0x1a1/0x280 [ 947.011778] ? may_open_dev+0x100/0x100 [ 947.015775] ? kasan_check_read+0x11/0x20 [ 947.019934] ? do_raw_spin_unlock+0x57/0x270 [ 947.024355] ? _raw_spin_unlock+0x2d/0x50 [ 947.024371] ? __alloc_fd+0x430/0x530 [ 947.024400] do_sys_open+0x3fe/0x5d0 [ 947.024420] ? filp_open+0x80/0x80 [ 947.032361] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 947.032378] ? do_syscall_64+0x26/0x610 [ 947.032393] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.032408] ? do_syscall_64+0x26/0x610 [ 947.032428] __x64_sys_open+0x7e/0xc0 [ 947.061588] do_syscall_64+0x103/0x610 [ 947.065482] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.070656] RIP: 0033:0x457e39 [ 947.073848] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 947.092741] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 947.100452] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 947.107706] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 947.114959] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 947.122220] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 947.129486] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 947.158925] audit: type=1804 audit(1549397741.887:140): pid=4474 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=add_template_measure cause=ENOMEM comm="syz-executor5" name="/root/syzkaller-testdir619555362/syzkaller.NiRR3t/303/file0/file1" dev="overlay" ino=149936 res=0 20:15:42 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000000001000"}, 0x1c) 20:15:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,wor']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:42 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6c000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:42 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x40000000000000) 20:15:42 executing program 5 (fault-call:9 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 947.577010] overlayfs: unrecognized mount option "wor" or missing value [ 947.619540] validate_nla: 8 callbacks suppressed [ 947.619549] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:42 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x71000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:42 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x80000000000000) [ 947.696101] FAULT_INJECTION: forcing a failure. [ 947.696101] name failslab, interval 1, probability 0, space 0, times 0 [ 947.719343] CPU: 0 PID: 4510 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 947.726386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 947.736198] Call Trace: [ 947.738802] dump_stack+0x172/0x1f0 [ 947.742439] should_fail.cold+0xa/0x1b [ 947.746338] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 947.751451] ? lock_downgrade+0x810/0x810 [ 947.755613] ? ___might_sleep+0x163/0x280 [ 947.759775] __should_failslab+0x121/0x190 [ 947.764020] should_failslab+0x9/0x14 [ 947.767825] __kmalloc+0x2dc/0x740 [ 947.771379] ? ima_write_template_field_data.isra.0+0x123/0x210 [ 947.777445] ima_write_template_field_data.isra.0+0x123/0x210 [ 947.783337] ima_eventname_init_common+0x13b/0x1b0 [ 947.788277] ima_eventname_ng_init+0x20/0x30 [ 947.792700] ima_alloc_init_template+0x255/0x3b0 [ 947.797483] ima_store_measurement+0x1bc/0x3e0 [ 947.802076] ? ima_collect_measurement+0x5c0/0x5c0 [ 947.807009] ? kmem_cache_alloc+0x341/0x710 [ 947.811348] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 947.816885] ? ima_d_path+0xbf/0x1ee [ 947.820603] process_measurement+0x119e/0x1570 [ 947.825197] ? ima_add_template_entry.cold+0x48/0x48 [ 947.830314] ? zap_class+0x460/0x460 [ 947.834035] ? do_dentry_open+0x925/0x1130 [ 947.838270] ? lockdep_init_map+0x10c/0x5b0 [ 947.842604] ? aa_get_task_label+0x344/0x680 [ 947.847012] ? find_held_lock+0x35/0x130 [ 947.851079] ? aa_get_task_label+0x344/0x680 [ 947.855496] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 947.861044] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 947.866503] ? refcount_inc_checked+0x70/0x70 [ 947.871022] ? refcount_dec_and_test_checked+0x1b/0x20 [ 947.876297] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 947.881838] ? apparmor_task_getsecid+0x94/0xd0 [ 947.886517] ima_file_check+0xc5/0x110 [ 947.890407] ? process_measurement+0x1570/0x1570 [ 947.895165] ? inode_permission+0xb4/0x570 [ 947.899413] path_openat+0x1130/0x4690 [ 947.903303] ? __lock_acquire+0x53b/0x4700 [ 947.907539] ? getname+0x1a/0x20 [ 947.910904] ? do_sys_open+0x2c9/0x5d0 [ 947.914810] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 947.919485] ? zap_class+0x460/0x460 [ 947.923215] ? __alloc_fd+0x430/0x530 [ 947.927051] do_filp_open+0x1a1/0x280 [ 947.930857] ? may_open_dev+0x100/0x100 [ 947.934846] ? kasan_check_read+0x11/0x20 [ 947.939008] ? do_raw_spin_unlock+0x57/0x270 [ 947.943420] ? _raw_spin_unlock+0x2d/0x50 [ 947.947593] ? __alloc_fd+0x430/0x530 [ 947.951423] do_sys_open+0x3fe/0x5d0 [ 947.955139] ? filp_open+0x80/0x80 [ 947.958699] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 947.963455] ? do_syscall_64+0x26/0x610 [ 947.967430] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.972816] ? do_syscall_64+0x26/0x610 [ 947.976800] __x64_sys_open+0x7e/0xc0 [ 947.980605] do_syscall_64+0x103/0x610 [ 947.984518] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 947.989718] RIP: 0033:0x457e39 [ 947.992916] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 948.011818] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 948.019522] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 948.026789] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 948.034060] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 948.041326] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 20:15:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=.']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 948.048605] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 948.058504] audit: type=1804 audit(1549397742.787:141): pid=4510 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=add_template_measure cause=ENOMEM comm="syz-executor5" name="/root/syzkaller-testdir619555362/syzkaller.NiRR3t/304/file0/file1" dev="overlay" ino=149131 res=0 [ 948.124821] overlayfs: workdir and upperdir must be separate subtrees [ 948.134608] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:42 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x73000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=.']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 948.339371] overlayfs: workdir and upperdir must be separate subtrees 20:15:43 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000000000100"}, 0x1c) 20:15:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:43 executing program 5 (fault-call:9 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:43 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xf0ffffffffffff) 20:15:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x74000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=.']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 948.541126] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 948.557006] overlayfs: workdir and upperdir must be separate subtrees 20:15:43 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x100000000000000) 20:15:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./fi']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7a000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 948.706588] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 948.745164] overlayfs: failed to resolve './fi': -2 20:15:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 948.765791] FAULT_INJECTION: forcing a failure. [ 948.765791] name failslab, interval 1, probability 0, space 0, times 0 20:15:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./fi']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 948.823738] CPU: 0 PID: 4558 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 948.830803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 948.840165] Call Trace: [ 948.842770] dump_stack+0x172/0x1f0 [ 948.846413] should_fail.cold+0xa/0x1b [ 948.850348] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 948.855507] ? ___might_sleep+0x163/0x280 [ 948.859705] __should_failslab+0x121/0x190 [ 948.860341] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 948.864170] should_failslab+0x9/0x14 [ 948.864209] kmem_cache_alloc+0x2be/0x710 [ 948.864234] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 948.864251] ? ext4_sb_bread+0x116/0x290 [ 948.864272] mb_cache_entry_create+0xc1/0x950 [ 948.864299] ext4_xattr_get+0x5ad/0xa00 [ 948.864324] ? ext4_xattr_ibody_get+0x540/0x540 [ 948.864340] ? d_find_any_alias+0x9e/0xc0 [ 948.864359] ? find_held_lock+0x35/0x130 [ 948.910564] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 948.915609] ext4_xattr_security_get+0x32/0x40 [ 948.920212] vfs_getxattr_alloc+0x1c9/0x3b0 [ 948.924550] ? ext4_xattr_security_set+0x40/0x40 [ 948.929318] ? path_setxattr+0x1b0/0x1b0 [ 948.929368] overlayfs: failed to resolve './fi': -2 [ 948.933396] ? do_raw_spin_unlock+0x57/0x270 [ 948.933441] ? _raw_spin_unlock+0x2d/0x50 [ 948.933486] cap_inode_getsecurity+0xdf/0x730 [ 948.933520] ? rootid_owns_currentns+0x1d0/0x1d0 [ 948.933557] ? check_preemption_disabled+0x48/0x290 [ 948.961385] security_inode_getsecurity+0xb6/0x130 [ 948.961411] vfs_getxattr+0x215/0x2a0 [ 948.961458] ? xattr_permission+0x300/0x300 [ 948.974468] ? selinux_is_enabled+0x43/0x60 [ 948.978809] ? kasan_check_write+0x14/0x20 [ 948.983057] ? override_creds+0x116/0x140 [ 948.987215] ovl_xattr_get+0x79/0xc0 [ 948.990956] ovl_other_xattr_get+0x35/0x40 [ 948.995224] ? ovl_other_xattr_set+0x50/0x50 [ 948.995241] __vfs_getxattr+0xf0/0x150 [ 948.995261] ? __vfs_setxattr+0x190/0x190 [ 948.995288] cap_inode_need_killpriv+0x43/0x70 [ 948.995309] security_inode_need_killpriv+0x69/0xb0 [ 948.995333] dentry_needs_remove_privs.part.0+0x24/0x80 [ 948.995353] dentry_needs_remove_privs+0x82/0xa2 [ 948.995373] do_truncate+0xe4/0x220 [ 949.022752] ? file_open_root+0x3c0/0x3c0 [ 949.022777] ? common_perm+0x680/0x680 [ 949.022801] ? ima_file_check+0xc5/0x110 [ 949.022825] ? apparmor_path_truncate+0x22/0x30 [ 949.022843] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 949.053522] path_openat+0x2cc6/0x4690 [ 949.057421] ? __lock_acquire+0x53b/0x4700 [ 949.061662] ? getname+0x1a/0x20 [ 949.065055] ? do_sys_open+0x2c9/0x5d0 [ 949.068965] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 949.073647] ? zap_class+0x460/0x460 [ 949.077438] ? find_held_lock+0x35/0x130 [ 949.081544] ? __alloc_fd+0x430/0x530 [ 949.085360] do_filp_open+0x1a1/0x280 [ 949.089176] ? may_open_dev+0x100/0x100 [ 949.093173] ? kasan_check_read+0x11/0x20 [ 949.097334] ? do_raw_spin_unlock+0x57/0x270 [ 949.101758] ? _raw_spin_unlock+0x2d/0x50 [ 949.105919] ? __alloc_fd+0x430/0x530 [ 949.109747] do_sys_open+0x3fe/0x5d0 [ 949.113501] ? filp_open+0x80/0x80 [ 949.117058] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 949.121815] ? do_syscall_64+0x26/0x610 [ 949.125785] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.131146] ? do_syscall_64+0x26/0x610 [ 949.135125] __x64_sys_open+0x7e/0xc0 [ 949.138958] do_syscall_64+0x103/0x610 [ 949.142837] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.148013] RIP: 0033:0x457e39 [ 949.151192] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 949.170097] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 949.177793] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 949.185053] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 949.192316] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 949.199568] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 949.206832] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:44 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000000000200"}, 0x1c) 20:15:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:44 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x85ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./fi']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:44 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x200000000000000) 20:15:44 executing program 5 (fault-call:9 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 949.470372] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 949.489409] overlayfs: failed to resolve './fi': -2 [ 949.502966] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:44 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x300000000000000) 20:15:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000fc0000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:44 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x9cffffff}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 949.554910] FAULT_INJECTION: forcing a failure. [ 949.554910] name failslab, interval 1, probability 0, space 0, times 0 [ 949.603610] CPU: 0 PID: 4588 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 949.610661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 949.620038] Call Trace: [ 949.622640] dump_stack+0x172/0x1f0 [ 949.626298] should_fail.cold+0xa/0x1b [ 949.630202] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 949.635315] ? lock_downgrade+0x810/0x810 [ 949.639476] ? ___might_sleep+0x163/0x280 [ 949.643643] __should_failslab+0x121/0x190 [ 949.647207] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 949.647909] should_failslab+0x9/0x14 [ 949.647940] kmem_cache_alloc_trace+0x2d1/0x760 [ 949.647965] ima_add_digest_entry+0x51/0x480 [ 949.660250] overlayfs: failed to resolve './file': -2 [ 949.663738] ima_add_template_entry+0x33d/0x620 [ 949.663760] ? ima_get_binary_runtime_size+0x50/0x50 [ 949.663773] ? kzfree+0x29/0x30 [ 949.663792] ? kzfree+0x29/0x30 [ 949.663826] ? crypto_destroy_tfm+0x15d/0x300 [ 949.694234] ima_store_template+0x1d8/0x2a0 [ 949.698560] ? ima_alloc_init_template+0x3b0/0x3b0 [ 949.703505] ? ima_alloc_init_template+0x2c7/0x3b0 [ 949.708474] ima_store_measurement+0x1fd/0x3e0 [ 949.713074] ? ima_collect_measurement+0x5c0/0x5c0 [ 949.718017] ? kmem_cache_alloc+0x341/0x710 [ 949.722358] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 949.727902] ? ima_d_path+0xbf/0x1ee [ 949.731628] process_measurement+0x119e/0x1570 [ 949.736520] ? ima_add_template_entry.cold+0x48/0x48 [ 949.741637] ? zap_class+0x460/0x460 [ 949.745404] ? do_dentry_open+0x925/0x1130 [ 949.749657] ? lockdep_init_map+0x10c/0x5b0 [ 949.754025] ? aa_get_task_label+0x344/0x680 [ 949.758449] ? find_held_lock+0x35/0x130 [ 949.762521] ? aa_get_task_label+0x344/0x680 [ 949.766951] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 949.772496] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 949.777955] ? refcount_inc_checked+0x70/0x70 [ 949.782479] ? refcount_dec_and_test_checked+0x1b/0x20 [ 949.787767] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 949.793315] ? apparmor_task_getsecid+0x94/0xd0 [ 949.797998] ima_file_check+0xc5/0x110 [ 949.801897] ? process_measurement+0x1570/0x1570 [ 949.806699] ? inode_permission+0xb4/0x570 [ 949.810966] path_openat+0x1130/0x4690 [ 949.814876] ? __lock_acquire+0x53b/0x4700 [ 949.819161] ? getname+0x1a/0x20 [ 949.822542] ? do_sys_open+0x2c9/0x5d0 [ 949.826508] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 949.831239] ? zap_class+0x460/0x460 [ 949.834995] ? __alloc_fd+0x430/0x530 [ 949.838808] do_filp_open+0x1a1/0x280 [ 949.842615] ? may_open_dev+0x100/0x100 [ 949.846609] ? kasan_check_read+0x11/0x20 [ 949.850765] ? do_raw_spin_unlock+0x57/0x270 [ 949.855181] ? _raw_spin_unlock+0x2d/0x50 [ 949.859332] ? __alloc_fd+0x430/0x530 [ 949.863150] do_sys_open+0x3fe/0x5d0 [ 949.866873] ? filp_open+0x80/0x80 [ 949.870424] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 949.875200] ? do_syscall_64+0x26/0x610 [ 949.879180] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.884554] ? do_syscall_64+0x26/0x610 [ 949.888537] __x64_sys_open+0x7e/0xc0 [ 949.892357] do_syscall_64+0x103/0x610 [ 949.896272] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 949.901462] RIP: 0033:0x457e39 [ 949.904659] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 949.923583] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 949.931296] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 949.938567] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 949.945839] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 20:15:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 949.953109] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 949.960395] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 950.010928] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 950.021528] overlayfs: failed to resolve './file': -2 [ 950.043469] ima: OUT OF MEMORY ERROR creating queue entry [ 950.073523] audit: type=1804 audit(1549397744.807:142): pid=4588 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=add_template_measure cause=ENOMEM comm="syz-executor5" name="/root/syzkaller-testdir619555362/syzkaller.NiRR3t/306/file0/file1" dev="overlay" ino=149256 res=0 20:15:45 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000000000300"}, 0x1c) 20:15:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:45 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x9fffffff}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:45 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x400000000000000) 20:15:45 executing program 5 (fault-call:9 fault-nth:27): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 950.393532] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 950.425689] overlayfs: failed to resolve './file': -2 20:15:45 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x500000000000000) [ 950.459626] FAULT_INJECTION: forcing a failure. [ 950.459626] name failslab, interval 1, probability 0, space 0, times 0 [ 950.493312] CPU: 1 PID: 4621 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 950.500355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 950.510062] Call Trace: [ 950.512681] dump_stack+0x172/0x1f0 [ 950.516320] should_fail.cold+0xa/0x1b [ 950.520206] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 950.525327] ? ___might_sleep+0x163/0x280 [ 950.529478] __should_failslab+0x121/0x190 [ 950.533713] should_failslab+0x9/0x14 [ 950.537512] __kmalloc+0x2dc/0x740 [ 950.541045] ? ext4_ext_remove_space+0x1784/0x4c50 [ 950.545970] ext4_ext_remove_space+0x1784/0x4c50 [ 950.550714] ? perf_trace_lock+0xeb/0x510 [ 950.554846] ? mark_held_locks+0x100/0x100 [ 950.559076] ? ext4_es_remove_extent+0xd8/0x380 [ 950.563745] ? find_held_lock+0x35/0x130 [ 950.567807] ? ext4_ext_index_trans_blocks+0x140/0x140 [ 950.573103] ? _raw_write_unlock+0x2d/0x50 [ 950.577340] ext4_ext_truncate+0x1b5/0x200 [ 950.581596] ext4_truncate+0xe08/0x13e0 [ 950.585655] ? ext4_can_truncate+0xc0/0xc0 [ 950.589898] ? ext4_punch_hole+0x10f0/0x10f0 [ 950.594325] ? unmap_mapping_range+0x48/0x60 [ 950.598741] ext4_setattr+0x1a1d/0x2350 [ 950.602718] ? current_time+0xd8/0x140 [ 950.606609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 950.612154] ? ext4_journalled_write_end+0x11b0/0x11b0 [ 950.617455] notify_change+0xad9/0xfb0 [ 950.621347] ovl_setattr+0x2f9/0x950 [ 950.625064] ? ovl_fill_inode+0x710/0x710 [ 950.629246] ? ovl_fill_inode+0x710/0x710 [ 950.633396] notify_change+0xad9/0xfb0 [ 950.637276] do_truncate+0x158/0x220 [ 950.640992] ? file_open_root+0x3c0/0x3c0 [ 950.645139] ? common_perm+0x680/0x680 [ 950.649030] ? apparmor_path_truncate+0x22/0x30 [ 950.653691] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 950.659227] path_openat+0x2cc6/0x4690 [ 950.663119] ? __lock_acquire+0x53b/0x4700 [ 950.667342] ? getname+0x1a/0x20 [ 950.670732] ? do_sys_open+0x2c9/0x5d0 [ 950.674636] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 950.679308] ? zap_class+0x460/0x460 [ 950.683007] ? find_held_lock+0x35/0x130 [ 950.687055] ? __alloc_fd+0x430/0x530 [ 950.690844] do_filp_open+0x1a1/0x280 [ 950.694631] ? may_open_dev+0x100/0x100 [ 950.698612] ? kasan_check_read+0x11/0x20 [ 950.702771] ? do_raw_spin_unlock+0x57/0x270 [ 950.707191] ? _raw_spin_unlock+0x2d/0x50 [ 950.711342] ? __alloc_fd+0x430/0x530 [ 950.715144] do_sys_open+0x3fe/0x5d0 [ 950.718867] ? filp_open+0x80/0x80 [ 950.722417] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 950.727160] ? do_syscall_64+0x26/0x610 [ 950.731123] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.736487] ? do_syscall_64+0x26/0x610 [ 950.740463] __x64_sys_open+0x7e/0xc0 [ 950.744262] do_syscall_64+0x103/0x610 [ 950.748166] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 950.753375] RIP: 0033:0x457e39 [ 950.756562] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 950.775723] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 950.783448] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 950.790762] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 [ 950.798033] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 950.805296] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 20:15:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:45 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xe4ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 950.812561] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:15:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 950.912194] EXT4-fs error (device sda1) in ext4_setattr:5688: Out of memory 20:15:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:46 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000000000400"}, 0x1c) 20:15:46 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x600000000000000) 20:15:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xfa000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:46 executing program 5 (fault-call:9 fault-nth:28): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xff000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 951.380203] FAULT_INJECTION: forcing a failure. [ 951.380203] name failslab, interval 1, probability 0, space 0, times 0 [ 951.430780] CPU: 1 PID: 4656 Comm: syz-executor5 Not tainted 5.0.0-rc5 #60 [ 951.437819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 951.447171] Call Trace: [ 951.449784] dump_stack+0x172/0x1f0 [ 951.453431] should_fail.cold+0xa/0x1b [ 951.457343] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 951.462463] ? ___might_sleep+0x163/0x280 [ 951.466680] __should_failslab+0x121/0x190 [ 951.470931] should_failslab+0x9/0x14 [ 951.474738] __kmalloc+0x2dc/0x740 [ 951.478287] ? ext4_ext_remove_space+0x1784/0x4c50 [ 951.483228] ext4_ext_remove_space+0x1784/0x4c50 [ 951.487996] ? perf_trace_lock+0xeb/0x510 [ 951.492169] ? mark_held_locks+0x100/0x100 [ 951.496430] ? ext4_es_remove_extent+0xd8/0x380 [ 951.501115] ? find_held_lock+0x35/0x130 [ 951.505235] ? ext4_ext_index_trans_blocks+0x140/0x140 [ 951.510540] ? _raw_write_unlock+0x2d/0x50 [ 951.514803] ext4_ext_truncate+0x1b5/0x200 [ 951.519046] ext4_truncate+0xe08/0x13e0 [ 951.523027] ? ext4_can_truncate+0xc0/0xc0 [ 951.527276] ? ext4_punch_hole+0x10f0/0x10f0 [ 951.531703] ? unmap_mapping_range+0x48/0x60 [ 951.536125] ext4_setattr+0x1a1d/0x2350 [ 951.540122] ? current_time+0xd8/0x140 [ 951.544023] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.549579] ? ext4_journalled_write_end+0x11b0/0x11b0 [ 951.554871] notify_change+0xad9/0xfb0 [ 951.558780] ovl_setattr+0x2f9/0x950 [ 951.562509] ? ovl_fill_inode+0x710/0x710 [ 951.566681] ? ovl_fill_inode+0x710/0x710 [ 951.570840] notify_change+0xad9/0xfb0 [ 951.574781] do_truncate+0x158/0x220 [ 951.578515] ? file_open_root+0x3c0/0x3c0 [ 951.582687] ? common_perm+0x680/0x680 [ 951.586603] ? apparmor_path_truncate+0x22/0x30 [ 951.591280] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 951.596836] path_openat+0x2cc6/0x4690 [ 951.600738] ? __lock_acquire+0x53b/0x4700 [ 951.604975] ? getname+0x1a/0x20 [ 951.608347] ? do_sys_open+0x2c9/0x5d0 [ 951.612260] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 951.616947] ? zap_class+0x460/0x460 [ 951.620687] ? __alloc_fd+0x430/0x530 [ 951.624505] do_filp_open+0x1a1/0x280 [ 951.628395] ? may_open_dev+0x100/0x100 [ 951.632399] ? kasan_check_read+0x11/0x20 [ 951.636557] ? do_raw_spin_unlock+0x57/0x270 [ 951.640979] ? _raw_spin_unlock+0x2d/0x50 [ 951.645138] ? __alloc_fd+0x430/0x530 [ 951.649147] do_sys_open+0x3fe/0x5d0 [ 951.652882] ? filp_open+0x80/0x80 [ 951.656450] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 951.661225] ? do_syscall_64+0x26/0x610 [ 951.665217] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.670592] ? do_syscall_64+0x26/0x610 [ 951.674579] __x64_sys_open+0x7e/0xc0 [ 951.678408] do_syscall_64+0x103/0x610 [ 951.682306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 951.687498] RIP: 0033:0x457e39 [ 951.690748] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 951.710063] RSP: 002b:00007f4f7426cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 951.717781] RAX: ffffffffffffffda RBX: 00007f4f7426cc90 RCX: 0000000000457e39 [ 951.725054] RDX: 0000000000000000 RSI: 0000000000000600 RDI: 00000000200001c0 20:15:46 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x700000000000000) 20:15:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 951.732388] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 951.739812] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4f7426d6d4 [ 951.747082] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 951.871730] EXT4-fs error (device sda1) in ext4_setattr:5688: Out of memory 20:15:46 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000000000500"}, 0x1c) 20:15:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xffff8000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:46 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x804000000000000) 20:15:46 executing program 5 (fault-call:9 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:47 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xc00000000000000) 20:15:47 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xffffff85}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:15:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000000000600"}, 0x1c) 20:15:47 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xffffff9c}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(0x0, &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:47 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xd00000000000000) 20:15:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x602, 0x0) 20:15:47 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xe26000000000000) [ 953.201561] validate_nla: 10 callbacks suppressed [ 953.201570] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xffffff9f}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(0x0, &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 953.285101] overlayfs: './file0' not a directory 20:15:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x604, 0x0) 20:15:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xffffffe4}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 953.398696] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 953.539968] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 953.585575] overlayfs: './file0' not a directory 20:15:48 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\a\x00'}, 0x1c) 20:15:48 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x1000000000000000) 20:15:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(0x0, &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x605, 0x0) [ 954.122829] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:48 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x1200000000000000) 20:15:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x10000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 954.172606] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 954.184403] overlayfs: './file0' not a directory 20:15:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x6c0, 0x0) 20:15:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 954.315932] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:49 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x1400000000000000) [ 954.441133] overlayfs: './file0' not a directory 20:15:49 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x40000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:49 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\b\x00'}, 0x1c) 20:15:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0xf00, 0x0) 20:15:49 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x1800000000000000) [ 955.016620] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 955.071489] overlayfs: './file0' not a directory 20:15:49 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x1e00000000000000) 20:15:49 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x80ffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x4100, 0x0) 20:15:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000a00000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 955.189606] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:50 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 955.304448] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:50 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x2000000000000000) [ 955.459140] audit: type=1800 audit(1549397750.187:143): pid=4843 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="file1" dev="overlay" ino=151685 res=0 [ 955.480110] overlayfs: './file0' not a directory 20:15:50 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 20:15:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:50 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x200000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(0x0, &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x2) 20:15:50 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x2400000000000000) [ 955.943041] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(0x0, &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:50 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:50 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x2a00000000000000) 20:15:50 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000c00000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x4) [ 956.065564] overlayfs: './file0' not a directory 20:15:51 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 956.397331] overlayfs: './file0' not a directory 20:15:51 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 20:15:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:51 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x3000000000000000) 20:15:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(0x0, &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:51 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x500000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x5) 20:15:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:51 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x3600000000000000) [ 956.992742] overlayfs: './file0' not a directory 20:15:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:51 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x600000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xc0) 20:15:51 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 957.284955] overlayfs: './file0' not a directory 20:15:52 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000000000e00"}, 0x1c) 20:15:52 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x700000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:52 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x3626000000000000) 20:15:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xf0) 20:15:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 957.886219] overlayfs: './file0' not a directory 20:15:52 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x3c00000000000000) 20:15:52 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x408) 20:15:52 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:52 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 958.237207] overlayfs: './file0' not a directory 20:15:53 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000000001000"}, 0x1c) 20:15:53 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xa00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:53 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x3f00000000000000) 20:15:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x500) [ 958.764531] validate_nla: 7 callbacks suppressed [ 958.764541] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:53 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x8bffffff00000000) [ 958.829164] overlayfs: './file0' not a directory 20:15:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:53 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xe00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x804) [ 958.945454] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 958.983433] overlayfs: './file0' not a directory 20:15:53 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0006000000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 959.131628] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 959.179839] overlayfs: './file0' not a directory 20:15:54 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00 \x00'}, 0x1c) 20:15:54 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x8cffffff00000000) 20:15:54 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xf00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x2000) [ 959.665345] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:54 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0006c00000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 959.727548] overlayfs: './file0' not a directory [ 959.740848] overlayfs: './file0' not a directory 20:15:54 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xa1ffffff00000000) 20:15:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 959.805406] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:54 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0007400000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xc000) [ 959.964616] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 959.977235] overlayfs: './file0' not a directory [ 960.057998] overlayfs: './file0' not a directory 20:15:55 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00?\x00'}, 0x1c) 20:15:55 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:55 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xa1ffffffffffffff) 20:15:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xf000) [ 960.555084] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 960.596192] overlayfs: './file0' not a directory 20:15:55 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xe4ffffff00000000) 20:15:55 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x1810000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 960.656904] overlayfs: './file0' not a directory 20:15:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xff0f) 20:15:55 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 960.702424] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:55 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 960.889250] overlayfs: './file0' not a directory [ 960.919257] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 960.930926] overlayfs: './file0' not a directory 20:15:56 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00@\x00'}, 0x1c) 20:15:56 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x2000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:56 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xe7fd000000000000) 20:15:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', 0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xf0ffff) 20:15:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 961.465638] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:15:56 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3a7d090000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 961.524591] overlayfs: './file0' not a directory [ 961.540664] overlayfs: './file0' not a directory 20:15:56 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', 0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:56 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xf4ffffff00000000) 20:15:56 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x1000000) 20:15:56 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000005000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 961.837331] overlayfs: './file0' not a directory [ 961.860802] overlayfs: './file0' not a directory 20:15:57 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00`\x00'}, 0x1c) 20:15:57 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', 0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:57 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xf5ffffff00000000) 20:15:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x2000000) 20:15:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 962.459890] overlayfs: './file0' not a directory 20:15:57 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x3f00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 962.493129] overlayfs: './file0' not a directory 20:15:57 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(0x0, 0x0, 0x0) 20:15:57 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xf6ffffff00000000) 20:15:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x4000000) 20:15:57 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 962.711727] overlayfs: './file0' not a directory [ 962.791751] overlayfs: './file0' not a directory 20:15:58 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000ffffff8d00"}, 0x1c) 20:15:58 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4000000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:58 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xfeffffff00000000) 20:15:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(0x0, 0x0, 0x0) 20:15:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x5000000) 20:15:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:58 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 963.435026] overlayfs: './file0' not a directory [ 963.441157] overlayfs: './file0' not a directory 20:15:58 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(0x0, 0x0, 0x0) 20:15:58 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xff01000000000000) 20:15:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x8040000) [ 963.717031] overlayfs: './file0' not a directory [ 963.717096] overlayfs: './file0' not a directory 20:15:58 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000fffffff500"}, 0x1c) 20:15:58 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:58 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:58 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xff0f000000000000) 20:15:58 executing program 1 (fault-call:10 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x20000000) [ 964.294878] validate_nla: 9 callbacks suppressed [ 964.294888] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 964.343514] FAULT_INJECTION: forcing a failure. [ 964.343514] name failslab, interval 1, probability 0, space 0, times 0 [ 964.352597] overlayfs: './file0' not a directory [ 964.359125] CPU: 1 PID: 5240 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 964.366734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.376094] Call Trace: [ 964.378724] dump_stack+0x172/0x1f0 [ 964.382362] should_fail.cold+0xa/0x1b [ 964.386269] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 964.391379] ? lock_downgrade+0x810/0x810 [ 964.395543] ? ___might_sleep+0x163/0x280 [ 964.399723] __should_failslab+0x121/0x190 [ 964.403963] should_failslab+0x9/0x14 [ 964.407764] kmem_cache_alloc+0x2be/0x710 [ 964.411916] ? kasan_check_write+0x14/0x20 [ 964.416160] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 964.421014] ? check_preemption_disabled+0x48/0x290 [ 964.426040] getname_flags+0xd6/0x5b0 [ 964.429853] getname+0x1a/0x20 [ 964.433051] do_sys_open+0x2c9/0x5d0 [ 964.436774] ? filp_open+0x80/0x80 [ 964.440325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 964.445086] ? do_syscall_64+0x26/0x610 [ 964.449071] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.454467] ? do_syscall_64+0x26/0x610 [ 964.458449] __x64_sys_open+0x7e/0xc0 [ 964.462266] do_syscall_64+0x103/0x610 [ 964.466157] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.471348] RIP: 0033:0x457e39 [ 964.474543] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 964.493530] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 964.501239] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 964.508509] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 964.515775] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 964.523040] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 964.530328] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 964.539972] overlayfs: './file0' not a directory 20:15:59 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x4c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:59 executing program 1 (fault-call:10 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d000000e000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:15:59 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xff1c010000000000) 20:15:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xc0000000) 20:15:59 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x5095090000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 964.649185] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 964.741251] FAULT_INJECTION: forcing a failure. [ 964.741251] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 964.753103] CPU: 1 PID: 5261 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 964.760122] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.769494] Call Trace: [ 964.772130] dump_stack+0x172/0x1f0 [ 964.775764] should_fail.cold+0xa/0x1b [ 964.779658] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 964.784780] ? debug_smp_processor_id+0x1c/0x20 [ 964.789438] ? perf_trace_lock+0xeb/0x510 [ 964.793569] ? mark_held_locks+0x100/0x100 [ 964.797795] should_fail_alloc_page+0x50/0x60 [ 964.802276] __alloc_pages_nodemask+0x1a1/0x710 [ 964.806958] ? __alloc_pages_slowpath+0x2900/0x2900 [ 964.811974] ? find_held_lock+0x35/0x130 [ 964.816070] cache_grow_begin+0x9c/0x8c0 [ 964.820150] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 964.825685] ? check_preemption_disabled+0x48/0x290 [ 964.830702] kmem_cache_alloc+0x645/0x710 [ 964.834836] ? kasan_check_write+0x14/0x20 [ 964.839065] getname_flags+0xd6/0x5b0 [ 964.842858] getname+0x1a/0x20 [ 964.846061] do_sys_open+0x2c9/0x5d0 [ 964.849762] ? filp_open+0x80/0x80 [ 964.853308] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 964.858062] ? do_syscall_64+0x26/0x610 [ 964.862028] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.867385] ? do_syscall_64+0x26/0x610 [ 964.871347] __x64_sys_open+0x7e/0xc0 [ 964.875134] do_syscall_64+0x103/0x610 [ 964.879034] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 964.884213] RIP: 0033:0x457e39 [ 964.887396] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 964.906284] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 964.913980] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 964.921233] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 964.928490] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 964.935746] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 964.942998] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 965.052564] overlayfs: './file0' not a directory [ 965.080017] overlayfs: './file0' not a directory 20:15:59 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000000fc00"}, 0x1c) 20:15:59 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:15:59 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:15:59 executing program 1 (fault-call:10 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:15:59 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xffffff7f00000000) 20:15:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xf4ffffff) [ 965.203706] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 965.249130] FAULT_INJECTION: forcing a failure. [ 965.249130] name failslab, interval 1, probability 0, space 0, times 0 [ 965.274875] overlayfs: './file0' not a directory [ 965.275883] overlayfs: './file0' not a directory 20:16:00 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 965.302400] CPU: 0 PID: 5287 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 965.309436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.318793] Call Trace: [ 965.321397] dump_stack+0x172/0x1f0 [ 965.325046] should_fail.cold+0xa/0x1b [ 965.328941] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 965.334058] ? lock_downgrade+0x810/0x810 [ 965.334077] ? ___might_sleep+0x163/0x280 [ 965.334102] __should_failslab+0x121/0x190 [ 965.334121] should_failslab+0x9/0x14 [ 965.334137] kmem_cache_alloc+0x2be/0x710 [ 965.354573] ? __save_stack_trace+0x8a/0xf0 [ 965.358916] __alloc_file+0x27/0x300 [ 965.362643] alloc_empty_file+0x72/0x170 [ 965.366738] path_openat+0xef/0x4690 [ 965.370457] ? __lock_acquire+0x53b/0x4700 [ 965.374710] ? getname+0x1a/0x20 [ 965.378088] ? do_sys_open+0x2c9/0x5d0 [ 965.381982] ? __x64_sys_open+0x7e/0xc0 [ 965.385967] ? do_syscall_64+0x103/0x610 [ 965.390035] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 965.395412] ? check_preemption_disabled+0x48/0x290 [ 965.400469] ? debug_smp_processor_id+0x1c/0x20 [ 965.405144] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 965.409811] ? __lock_is_held+0xb6/0x140 [ 965.413874] ? zap_class+0x460/0x460 [ 965.417596] ? __alloc_fd+0x430/0x530 [ 965.421402] do_filp_open+0x1a1/0x280 [ 965.425210] ? may_open_dev+0x100/0x100 [ 965.429193] ? lock_downgrade+0x810/0x810 [ 965.433350] ? kasan_check_read+0x11/0x20 [ 965.437498] ? do_raw_spin_unlock+0x57/0x270 [ 965.441935] ? _raw_spin_unlock+0x2d/0x50 [ 965.446096] ? __alloc_fd+0x430/0x530 [ 965.449909] do_sys_open+0x3fe/0x5d0 [ 965.453631] ? filp_open+0x80/0x80 [ 965.457183] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 965.461944] ? do_syscall_64+0x26/0x610 [ 965.465922] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 965.471288] ? do_syscall_64+0x26/0x610 [ 965.475268] __x64_sys_open+0x7e/0xc0 [ 965.479080] do_syscall_64+0x103/0x610 [ 965.482976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 965.488165] RIP: 0033:0x457e39 [ 965.491361] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 965.510261] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 965.517968] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 965.525238] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 965.532513] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 965.539804] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 20:16:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xf5ffffff) [ 965.547085] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:16:00 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xffffffff00000000) [ 965.600669] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:00 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:00 executing program 1 (fault-call:10 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 965.734903] overlayfs: './file0' not a directory [ 965.752307] overlayfs: './file0' not a directory [ 965.819515] FAULT_INJECTION: forcing a failure. [ 965.819515] name failslab, interval 1, probability 0, space 0, times 0 [ 965.832599] CPU: 1 PID: 5317 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 965.839655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.849024] Call Trace: [ 965.851604] dump_stack+0x172/0x1f0 [ 965.855226] should_fail.cold+0xa/0x1b [ 965.859098] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 965.864195] ? lock_downgrade+0x810/0x810 [ 965.868333] ? ___might_sleep+0x163/0x280 [ 965.872475] __should_failslab+0x121/0x190 [ 965.876714] should_failslab+0x9/0x14 [ 965.880500] kmem_cache_alloc_trace+0x2d1/0x760 [ 965.885156] ? ___might_sleep+0x163/0x280 [ 965.889324] ? __might_sleep+0x95/0x190 [ 965.893289] apparmor_file_alloc_security+0x112/0x940 [ 965.898469] security_file_alloc+0x69/0xb0 [ 965.902698] __alloc_file+0xac/0x300 [ 965.906409] alloc_empty_file+0x72/0x170 [ 965.910458] path_openat+0xef/0x4690 [ 965.914160] ? __lock_acquire+0x53b/0x4700 [ 965.918378] ? getname+0x1a/0x20 [ 965.921724] ? do_sys_open+0x2c9/0x5d0 [ 965.925595] ? __x64_sys_open+0x7e/0xc0 [ 965.929554] ? do_syscall_64+0x103/0x610 [ 965.933600] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 965.938950] ? check_preemption_disabled+0x48/0x290 [ 965.943952] ? debug_smp_processor_id+0x1c/0x20 [ 965.948605] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 965.953259] ? __lock_is_held+0xb6/0x140 [ 965.957301] ? zap_class+0x460/0x460 [ 965.961003] ? __alloc_fd+0x430/0x530 [ 965.964791] do_filp_open+0x1a1/0x280 [ 965.968594] ? may_open_dev+0x100/0x100 [ 965.972556] ? lock_downgrade+0x810/0x810 [ 965.976702] ? kasan_check_read+0x11/0x20 [ 965.980841] ? do_raw_spin_unlock+0x57/0x270 [ 965.985234] ? _raw_spin_unlock+0x2d/0x50 [ 965.989366] ? __alloc_fd+0x430/0x530 [ 965.993157] do_sys_open+0x3fe/0x5d0 [ 965.996880] ? filp_open+0x80/0x80 [ 966.000410] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 966.005149] ? do_syscall_64+0x26/0x610 [ 966.009108] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 966.014455] ? do_syscall_64+0x26/0x610 [ 966.018416] __x64_sys_open+0x7e/0xc0 [ 966.022203] do_syscall_64+0x103/0x610 [ 966.026077] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 966.031249] RIP: 0033:0x457e39 [ 966.034429] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 966.053322] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 966.061010] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 966.068273] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 966.075526] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 966.082777] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 966.090030] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:16:00 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000080fe00"}, 0x1c) 20:16:00 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xf6ffffff) 20:16:00 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xfffffffffffff000) 20:16:00 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x6c00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:00 executing program 1 (fault-call:10 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:01 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 966.253699] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 966.274550] overlayfs: './file0' not a directory [ 966.282201] FAULT_INJECTION: forcing a failure. [ 966.282201] name failslab, interval 1, probability 0, space 0, times 0 [ 966.294065] overlayfs: './file0' not a directory [ 966.343838] CPU: 1 PID: 5333 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 966.350875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 966.360232] Call Trace: [ 966.362838] dump_stack+0x172/0x1f0 [ 966.366499] should_fail.cold+0xa/0x1b [ 966.370432] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 966.375556] ? lock_downgrade+0x810/0x810 [ 966.379725] ? ___might_sleep+0x163/0x280 [ 966.383890] __should_failslab+0x121/0x190 [ 966.388131] should_failslab+0x9/0x14 [ 966.391937] kmem_cache_alloc_trace+0x2d1/0x760 [ 966.396606] ? ___might_sleep+0x163/0x280 [ 966.400760] ? __might_sleep+0x95/0x190 [ 966.404749] apparmor_file_alloc_security+0x112/0x940 [ 966.409939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 966.415486] security_file_alloc+0x69/0xb0 [ 966.419729] __alloc_file+0xac/0x300 [ 966.423452] alloc_empty_file_noaccount+0x1e/0x90 [ 966.428300] open_with_fake_path+0x27/0xe0 [ 966.432539] ovl_open_realfile+0xd1/0x120 [ 966.436704] ovl_open+0x11b/0x270 [ 966.440169] do_dentry_open+0x47d/0x1130 [ 966.444238] ? ovl_llseek+0x110/0x110 [ 966.448044] ? chown_common+0x5c0/0x5c0 [ 966.452039] ? inode_permission+0xb4/0x570 [ 966.456282] vfs_open+0xa0/0xd0 [ 966.459566] path_openat+0x10d7/0x4690 [ 966.463464] ? __lock_acquire+0x53b/0x4700 [ 966.467704] ? getname+0x1a/0x20 [ 966.471069] ? do_sys_open+0x2c9/0x5d0 [ 966.474976] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 966.479647] ? zap_class+0x460/0x460 [ 966.483371] ? __alloc_fd+0x430/0x530 [ 966.487177] do_filp_open+0x1a1/0x280 [ 966.490986] ? may_open_dev+0x100/0x100 [ 966.494973] ? kasan_check_read+0x11/0x20 [ 966.499127] ? do_raw_spin_unlock+0x57/0x270 [ 966.503574] ? _raw_spin_unlock+0x2d/0x50 [ 966.507722] ? __alloc_fd+0x430/0x530 [ 966.511536] do_sys_open+0x3fe/0x5d0 [ 966.515265] ? filp_open+0x80/0x80 [ 966.518816] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 966.523593] ? do_syscall_64+0x26/0x610 [ 966.527566] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 966.532930] ? do_syscall_64+0x26/0x610 [ 966.536914] __x64_sys_open+0x7e/0xc0 [ 966.540764] do_syscall_64+0x103/0x610 [ 966.544708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 966.549910] RIP: 0033:0x457e39 [ 966.553119] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 966.572050] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 966.579774] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 966.587039] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 20:16:01 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffa1) 20:16:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xfeffffff) 20:16:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 966.594322] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 966.601586] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 966.608868] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 966.661889] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000020000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:01 executing program 1 (fault-call:10 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 966.781187] overlayfs: './file0' not a directory [ 966.795817] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 966.819084] overlayfs: './file0' not a directory [ 966.827380] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 966.901826] FAULT_INJECTION: forcing a failure. [ 966.901826] name failslab, interval 1, probability 0, space 0, times 0 [ 966.919455] CPU: 0 PID: 5359 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 966.926487] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 966.926494] Call Trace: [ 966.926523] dump_stack+0x172/0x1f0 [ 966.926549] should_fail.cold+0xa/0x1b [ 966.926572] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 966.942114] ? lock_downgrade+0x810/0x810 [ 966.942135] ? ___might_sleep+0x163/0x280 [ 966.942160] __should_failslab+0x121/0x190 [ 966.942180] should_failslab+0x9/0x14 [ 966.942197] kmem_cache_alloc_trace+0x2d1/0x760 [ 966.942211] ? ___might_sleep+0x163/0x280 [ 966.942230] ? __might_sleep+0x95/0x190 [ 966.942254] apparmor_file_alloc_security+0x112/0x940 [ 966.959503] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 966.959527] security_file_alloc+0x69/0xb0 [ 966.959548] __alloc_file+0xac/0x300 [ 966.959567] alloc_empty_file_noaccount+0x1e/0x90 [ 966.967589] open_with_fake_path+0x27/0xe0 [ 966.967609] ovl_open_realfile+0xd1/0x120 [ 966.967626] ovl_open+0x11b/0x270 [ 966.967647] do_dentry_open+0x47d/0x1130 [ 967.019670] ? ovl_llseek+0x110/0x110 [ 967.023493] ? chown_common+0x5c0/0x5c0 [ 967.027460] ? inode_permission+0xb4/0x570 [ 967.031698] vfs_open+0xa0/0xd0 [ 967.034991] path_openat+0x10d7/0x4690 [ 967.038870] ? __lock_acquire+0x53b/0x4700 [ 967.043103] ? getname+0x1a/0x20 [ 967.046470] ? do_sys_open+0x2c9/0x5d0 [ 967.050351] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 967.055008] ? zap_class+0x460/0x460 [ 967.058732] ? __alloc_fd+0x430/0x530 [ 967.062520] do_filp_open+0x1a1/0x280 [ 967.066323] ? may_open_dev+0x100/0x100 [ 967.070304] ? kasan_check_read+0x11/0x20 [ 967.074441] ? do_raw_spin_unlock+0x57/0x270 [ 967.078839] ? _raw_spin_unlock+0x2d/0x50 [ 967.083013] ? __alloc_fd+0x430/0x530 [ 967.086809] do_sys_open+0x3fe/0x5d0 [ 967.090528] ? filp_open+0x80/0x80 [ 967.094088] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 967.098862] ? do_syscall_64+0x26/0x610 20:16:01 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000000c0fe00"}, 0x1c) 20:16:01 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:01 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) 20:16:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xff0f0000) 20:16:01 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d000003f000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 967.102858] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.108232] ? do_syscall_64+0x26/0x610 [ 967.112234] __x64_sys_open+0x7e/0xc0 [ 967.116050] do_syscall_64+0x103/0x610 [ 967.119948] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.125178] RIP: 0033:0x457e39 [ 967.128387] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 967.147290] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 967.147307] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 967.147316] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 967.147325] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 967.147335] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 967.147344] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 967.179720] overlayfs: './file0' not a directory [ 967.198078] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 967.209723] overlayfs: './file0' not a directory 20:16:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xfffff000) 20:16:02 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) mknod$loop(&(0x7f0000000080)='./file1\x00', 0x400, 0x1) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:02 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:02 executing program 1 (fault-call:10 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:02 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x7a00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 967.414195] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 967.418334] overlayfs: './file0' not a directory [ 967.450573] overlayfs: './file0' not a directory 20:16:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 967.517040] FAULT_INJECTION: forcing a failure. [ 967.517040] name failslab, interval 1, probability 0, space 0, times 0 [ 967.571459] CPU: 0 PID: 5396 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 967.578500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 967.587860] Call Trace: [ 967.590494] dump_stack+0x172/0x1f0 [ 967.594153] should_fail.cold+0xa/0x1b [ 967.598059] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 967.603193] ? ___might_sleep+0x163/0x280 [ 967.607358] __should_failslab+0x121/0x190 [ 967.611614] should_failslab+0x9/0x14 [ 967.615424] kmem_cache_alloc+0x2be/0x710 [ 967.619578] ? lock_acquire+0x16f/0x3f0 [ 967.623574] ? process_measurement+0x1540/0x1570 [ 967.628337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 967.633887] integrity_inode_get+0x4e/0x260 [ 967.638219] process_measurement+0x2c7/0x1570 [ 967.642744] ? ima_add_template_entry.cold+0x48/0x48 [ 967.647854] ? zap_class+0x460/0x460 [ 967.651573] ? do_dentry_open+0x925/0x1130 [ 967.655813] ? lockdep_init_map+0x10c/0x5b0 [ 967.660162] ? aa_get_task_label+0x344/0x680 [ 967.664574] ? find_held_lock+0x35/0x130 [ 967.664603] ? aa_get_task_label+0x344/0x680 [ 967.664627] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 967.664645] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 967.664663] ? refcount_inc_checked+0x70/0x70 [ 967.664706] ? refcount_dec_and_test_checked+0x1b/0x20 [ 967.673155] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 967.673187] ? apparmor_task_getsecid+0x94/0xd0 [ 967.673207] ima_file_check+0xc5/0x110 [ 967.673225] ? process_measurement+0x1570/0x1570 [ 967.673242] ? inode_permission+0xb4/0x570 [ 967.673269] path_openat+0x1130/0x4690 [ 967.673285] ? __lock_acquire+0x53b/0x4700 [ 967.673299] ? getname+0x1a/0x20 [ 967.673315] ? do_sys_open+0x2c9/0x5d0 [ 967.732788] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 967.737476] ? zap_class+0x460/0x460 [ 967.741200] ? __alloc_fd+0x430/0x530 [ 967.745016] do_filp_open+0x1a1/0x280 [ 967.748815] ? may_open_dev+0x100/0x100 [ 967.752801] ? kasan_check_read+0x11/0x20 [ 967.756965] ? do_raw_spin_unlock+0x57/0x270 [ 967.761372] ? _raw_spin_unlock+0x2d/0x50 [ 967.765520] ? __alloc_fd+0x430/0x530 [ 967.769341] do_sys_open+0x3fe/0x5d0 [ 967.773047] ? filp_open+0x80/0x80 [ 967.776595] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 967.781348] ? do_syscall_64+0x26/0x610 [ 967.785319] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.790690] ? do_syscall_64+0x26/0x610 [ 967.794673] __x64_sys_open+0x7e/0xc0 [ 967.798487] do_syscall_64+0x103/0x610 [ 967.802488] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 967.807662] RIP: 0033:0x457e39 [ 967.810855] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 967.829741] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 967.837444] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 967.844800] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 967.852063] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 967.859315] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 967.866568] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:16:02 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000fffffffe00"}, 0x1c) 20:16:02 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xffffff7f) 20:16:02 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x85ffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:02 executing program 1 (fault-call:10 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 968.150558] overlayfs: './file0' not a directory 20:16:02 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x8) r0 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x1000, 0x8000) ioctl$VHOST_GET_VRING_BASE(r0, 0xc008af12, &(0x7f00000001c0)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="753d2e6bd49e0d7ab024ff95eb9366696c653100000000000000000000d48200000000000000000000000020000000"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$VT_RELDISP(r1, 0x5605) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:02 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x9cffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:02 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 968.180365] FAULT_INJECTION: forcing a failure. [ 968.180365] name failslab, interval 1, probability 0, space 0, times 0 [ 968.180829] overlayfs: './file0' not a directory [ 968.213581] CPU: 0 PID: 5414 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 968.220614] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 968.229965] Call Trace: [ 968.232570] dump_stack+0x172/0x1f0 [ 968.236219] should_fail.cold+0xa/0x1b [ 968.240124] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 968.245245] ? ___might_sleep+0x163/0x280 [ 968.249405] __should_failslab+0x121/0x190 [ 968.253647] should_failslab+0x9/0x14 [ 968.253696] kmem_cache_alloc+0x2be/0x710 [ 968.253718] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 968.253734] ? ext4_sb_bread+0x116/0x290 [ 968.253755] mb_cache_entry_create+0xc1/0x950 [ 968.253778] ext4_xattr_get+0x5ad/0xa00 [ 968.279769] ? ext4_xattr_ibody_get+0x540/0x540 [ 968.284449] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 968.289471] ? ext4_xattr_security_set+0x40/0x40 [ 968.294232] ext4_xattr_security_get+0x32/0x40 [ 968.298831] __vfs_getxattr+0xf0/0x150 [ 968.302735] ? __vfs_setxattr+0x190/0x190 [ 968.306899] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 968.312450] ? security_inode_getsecurity+0xfb/0x130 [ 968.317570] vfs_getxattr+0x264/0x2a0 [ 968.321387] ? xattr_permission+0x300/0x300 [ 968.325736] ? selinux_is_enabled+0x43/0x60 [ 968.330078] ? kasan_check_write+0x14/0x20 [ 968.334329] ? override_creds+0x116/0x140 [ 968.338486] ovl_xattr_get+0x79/0xc0 [ 968.342217] ovl_other_xattr_get+0x35/0x40 [ 968.346459] vfs_getxattr_alloc+0x1c9/0x3b0 [ 968.350829] ? ovl_other_xattr_set+0x50/0x50 [ 968.355255] ? path_setxattr+0x1b0/0x1b0 [ 968.359317] ? lock_downgrade+0x810/0x810 [ 968.363483] ima_read_xattr+0x31/0x60 [ 968.367289] process_measurement+0xe93/0x1570 [ 968.371797] ? ima_add_template_entry.cold+0x48/0x48 [ 968.376900] ? zap_class+0x460/0x460 [ 968.380630] ? do_dentry_open+0x925/0x1130 [ 968.384861] ? lockdep_init_map+0x10c/0x5b0 [ 968.389233] ? aa_get_task_label+0x344/0x680 [ 968.393658] ? find_held_lock+0x35/0x130 [ 968.397737] ? aa_get_task_label+0x344/0x680 [ 968.402158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 968.407725] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 968.413181] ? refcount_inc_checked+0x70/0x70 [ 968.417703] ? refcount_dec_and_test_checked+0x1b/0x20 [ 968.422983] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 968.428535] ? apparmor_task_getsecid+0x94/0xd0 [ 968.433209] ima_file_check+0xc5/0x110 [ 968.437102] ? process_measurement+0x1570/0x1570 [ 968.441865] ? inode_permission+0xb4/0x570 [ 968.446110] path_openat+0x1130/0x4690 [ 968.450011] ? __lock_acquire+0x53b/0x4700 [ 968.454260] ? getname+0x1a/0x20 [ 968.457623] ? do_sys_open+0x2c9/0x5d0 [ 968.461540] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 968.466216] ? zap_class+0x460/0x460 [ 968.469933] ? __alloc_fd+0x430/0x530 [ 968.473738] do_filp_open+0x1a1/0x280 [ 968.477541] ? may_open_dev+0x100/0x100 [ 968.481531] ? kasan_check_read+0x11/0x20 [ 968.485686] ? do_raw_spin_unlock+0x57/0x270 [ 968.490104] ? _raw_spin_unlock+0x2d/0x50 [ 968.494255] ? __alloc_fd+0x430/0x530 [ 968.498074] do_sys_open+0x3fe/0x5d0 [ 968.501790] ? filp_open+0x80/0x80 [ 968.505335] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 968.510095] ? do_syscall_64+0x26/0x610 [ 968.514072] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 968.519432] ? do_syscall_64+0x26/0x610 [ 968.523409] __x64_sys_open+0x7e/0xc0 [ 968.527210] do_syscall_64+0x103/0x610 [ 968.531105] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 968.536295] RIP: 0033:0x457e39 [ 968.539486] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 968.558387] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 968.566091] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 968.573358] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 968.580625] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 968.587894] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 968.595162] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:16:03 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xfffffff4) [ 968.690302] overlayfs: unrecognized mount option "u=.kԞ z$file1" or missing value 20:16:03 executing program 1 (fault-call:10 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 968.751455] overlayfs: unrecognized mount option "u=.kԞ z$file1" or missing value [ 968.860085] overlayfs: './file0' not a directory [ 968.884089] FAULT_INJECTION: forcing a failure. [ 968.884089] name failslab, interval 1, probability 0, space 0, times 0 [ 968.903952] CPU: 1 PID: 5446 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 968.910990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 968.920638] Call Trace: [ 968.923236] dump_stack+0x172/0x1f0 [ 968.926884] should_fail.cold+0xa/0x1b [ 968.930762] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 968.935860] ? ___might_sleep+0x163/0x280 [ 968.940006] __should_failslab+0x121/0x190 [ 968.944233] should_failslab+0x9/0x14 [ 968.948019] __kmalloc_track_caller+0x2d8/0x740 [ 968.952690] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 968.958231] ? revert_creds+0x130/0x170 [ 968.962198] ? ovl_xattr_get+0x88/0xc0 [ 968.966070] ? vfs_getxattr_alloc+0x26e/0x3b0 [ 968.970552] krealloc+0x66/0xd0 [ 968.973819] vfs_getxattr_alloc+0x26e/0x3b0 [ 968.978128] ? path_setxattr+0x1b0/0x1b0 [ 968.982172] ? lock_downgrade+0x810/0x810 [ 968.986318] ima_read_xattr+0x31/0x60 [ 968.990110] process_measurement+0xe93/0x1570 [ 968.994598] ? ima_add_template_entry.cold+0x48/0x48 [ 968.999690] ? zap_class+0x460/0x460 [ 969.003400] ? do_dentry_open+0x925/0x1130 [ 969.007627] ? lockdep_init_map+0x10c/0x5b0 [ 969.011937] ? aa_get_task_label+0x344/0x680 [ 969.016330] ? find_held_lock+0x35/0x130 [ 969.020387] ? aa_get_task_label+0x344/0x680 [ 969.024797] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 969.030340] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 969.036029] ? refcount_inc_checked+0x70/0x70 [ 969.040548] ? refcount_dec_and_test_checked+0x1b/0x20 [ 969.045822] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 969.051344] ? apparmor_task_getsecid+0x94/0xd0 [ 969.056003] ima_file_check+0xc5/0x110 [ 969.059880] ? process_measurement+0x1570/0x1570 [ 969.064622] ? inode_permission+0xb4/0x570 [ 969.068847] path_openat+0x1130/0x4690 [ 969.072724] ? __lock_acquire+0x53b/0x4700 [ 969.076947] ? getname+0x1a/0x20 [ 969.080300] ? do_sys_open+0x2c9/0x5d0 [ 969.084179] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 969.088859] ? zap_class+0x460/0x460 [ 969.092561] ? __alloc_fd+0x430/0x530 [ 969.096352] do_filp_open+0x1a1/0x280 [ 969.100140] ? may_open_dev+0x100/0x100 [ 969.104106] ? kasan_check_read+0x11/0x20 [ 969.108250] ? do_raw_spin_unlock+0x57/0x270 [ 969.112688] ? _raw_spin_unlock+0x2d/0x50 [ 969.116836] ? __alloc_fd+0x430/0x530 [ 969.120649] do_sys_open+0x3fe/0x5d0 [ 969.124370] ? filp_open+0x80/0x80 [ 969.127905] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 969.132644] ? do_syscall_64+0x26/0x610 [ 969.136603] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 969.141961] ? do_syscall_64+0x26/0x610 [ 969.145936] __x64_sys_open+0x7e/0xc0 [ 969.149724] do_syscall_64+0x103/0x610 [ 969.153627] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 969.158817] RIP: 0033:0x457e39 [ 969.162004] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 969.180887] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 969.188584] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 969.195837] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 969.203089] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 969.210343] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 969.217597] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:16:04 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000000ff00"}, 0x1c) 20:16:04 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x9fffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:04 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lower1,sorkdir=./file1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x1, 0x2) 20:16:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xfffffff5) 20:16:04 executing program 1 (fault-call:10 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 969.339351] validate_nla: 4 callbacks suppressed [ 969.339360] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 969.363101] overlayfs: unrecognized mount option "lower1" or missing value 20:16:04 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xe4ffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0005865000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 969.402091] FAULT_INJECTION: forcing a failure. [ 969.402091] name failslab, interval 1, probability 0, space 0, times 0 [ 969.416775] overlayfs: unrecognized mount option "lower1" or missing value [ 969.439927] overlayfs: './file0' not a directory [ 969.465834] CPU: 0 PID: 5459 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 969.472880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 969.482239] Call Trace: [ 969.484844] dump_stack+0x172/0x1f0 [ 969.488508] should_fail.cold+0xa/0x1b [ 969.492441] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 969.497560] ? ___might_sleep+0x163/0x280 [ 969.501793] __should_failslab+0x121/0x190 [ 969.506051] should_failslab+0x9/0x14 [ 969.509866] kmem_cache_alloc+0x2be/0x710 20:16:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 969.513752] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 969.514028] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 969.526856] ? ext4_sb_bread+0x116/0x290 [ 969.530933] mb_cache_entry_create+0xc1/0x950 [ 969.535451] ext4_xattr_get+0x5ad/0xa00 [ 969.539449] ? ext4_xattr_ibody_get+0x540/0x540 [ 969.544130] ? __sanitizer_cov_trace_cmp1+0x17/0x20 [ 969.549165] ? ext4_xattr_security_set+0x40/0x40 [ 969.553925] ext4_xattr_security_get+0x32/0x40 [ 969.558522] __vfs_getxattr+0xf0/0x150 [ 969.562424] ? __vfs_setxattr+0x190/0x190 [ 969.566582] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 969.572131] ? security_inode_getsecurity+0xfb/0x130 [ 969.573402] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 969.577246] vfs_getxattr+0x264/0x2a0 [ 969.577268] ? xattr_permission+0x300/0x300 [ 969.577285] ? selinux_is_enabled+0x43/0x60 [ 969.577307] ? kasan_check_write+0x14/0x20 [ 969.601209] ? override_creds+0x116/0x140 [ 969.605366] ovl_xattr_get+0x79/0xc0 [ 969.609088] ovl_other_xattr_get+0x35/0x40 [ 969.613325] vfs_getxattr_alloc+0x2ee/0x3b0 [ 969.617649] ? path_setxattr+0x1b0/0x1b0 [ 969.621723] ? lock_downgrade+0x810/0x810 [ 969.625888] ima_read_xattr+0x31/0x60 [ 969.629704] process_measurement+0xe93/0x1570 [ 969.634211] ? ima_add_template_entry.cold+0x48/0x48 [ 969.639315] ? zap_class+0x460/0x460 [ 969.643029] ? do_dentry_open+0x925/0x1130 [ 969.647264] ? lockdep_init_map+0x10c/0x5b0 [ 969.651590] ? aa_get_task_label+0x344/0x680 [ 969.655999] ? find_held_lock+0x35/0x130 [ 969.660068] ? aa_get_task_label+0x344/0x680 [ 969.664524] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 969.670087] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 969.675574] ? refcount_inc_checked+0x70/0x70 [ 969.680082] ? refcount_dec_and_test_checked+0x1b/0x20 [ 969.685362] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 969.690902] ? apparmor_task_getsecid+0x94/0xd0 [ 969.695578] ima_file_check+0xc5/0x110 [ 969.699471] ? process_measurement+0x1570/0x1570 [ 969.704232] ? inode_permission+0xb4/0x570 [ 969.708483] path_openat+0x1130/0x4690 [ 969.712369] ? __lock_acquire+0x53b/0x4700 [ 969.716602] ? getname+0x1a/0x20 [ 969.719966] ? do_sys_open+0x2c9/0x5d0 [ 969.723874] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 969.728548] ? zap_class+0x460/0x460 [ 969.732739] ? __alloc_fd+0x430/0x530 [ 969.736546] do_filp_open+0x1a1/0x280 [ 969.740354] ? may_open_dev+0x100/0x100 [ 969.744341] ? kasan_check_read+0x11/0x20 [ 969.748492] ? do_raw_spin_unlock+0x57/0x270 [ 969.752905] ? _raw_spin_unlock+0x2d/0x50 [ 969.757054] ? __alloc_fd+0x430/0x530 [ 969.760870] do_sys_open+0x3fe/0x5d0 [ 969.764589] ? filp_open+0x80/0x80 [ 969.768139] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 969.772892] ? do_syscall_64+0x26/0x610 [ 969.776869] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 969.782234] ? do_syscall_64+0x26/0x610 [ 969.786214] __x64_sys_open+0x7e/0xc0 [ 969.790021] do_syscall_64+0x103/0x610 [ 969.793913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 969.799111] RIP: 0033:0x457e39 20:16:04 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, 0x0}) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 969.802315] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 969.821220] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 969.828929] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 969.836194] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 969.843465] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 969.850732] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 969.858000] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:16:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xfffffff6) 20:16:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 969.970557] overlayfs: './file0' not a directory [ 969.982001] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 970.127383] overlayfs: './file0' not a directory 20:16:04 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00008dffffff00"}, 0x1c) 20:16:04 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:04 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:04 executing program 1 (fault-call:10 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:04 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xfa00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xfffffffe) [ 970.233155] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d000007a000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:05 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xff00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 970.322880] FAULT_INJECTION: forcing a failure. [ 970.322880] name failslab, interval 1, probability 0, space 0, times 0 [ 970.344532] overlayfs: './file0' not a directory [ 970.365706] overlayfs: './file0' not a directory [ 970.374535] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 970.392393] CPU: 0 PID: 5509 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 970.399424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 970.408783] Call Trace: [ 970.411383] dump_stack+0x172/0x1f0 [ 970.415021] should_fail.cold+0xa/0x1b [ 970.418914] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 970.424022] ? kfree+0x173/0x230 [ 970.427391] ? ___might_sleep+0x163/0x280 [ 970.431550] __should_failslab+0x121/0x190 [ 970.435790] should_failslab+0x9/0x14 [ 970.439589] __kmalloc_track_caller+0x2d8/0x740 [ 970.444262] ? kzfree+0x29/0x30 [ 970.447544] ? crypto_destroy_tfm+0x15d/0x300 [ 970.452041] ? ima_collect_measurement+0x375/0x5c0 [ 970.456979] krealloc+0x66/0xd0 [ 970.460264] ima_collect_measurement+0x375/0x5c0 [ 970.465022] ? ovl_other_xattr_get+0x35/0x40 [ 970.469436] ? ima_get_action+0xa0/0xa0 [ 970.473435] process_measurement+0xeca/0x1570 [ 970.477941] ? ima_add_template_entry.cold+0x48/0x48 [ 970.483041] ? zap_class+0x460/0x460 [ 970.486761] ? do_dentry_open+0x925/0x1130 [ 970.490997] ? lockdep_init_map+0x10c/0x5b0 [ 970.495324] ? aa_get_task_label+0x344/0x680 [ 970.499733] ? find_held_lock+0x35/0x130 [ 970.503802] ? aa_get_task_label+0x344/0x680 [ 970.508221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 970.513761] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 970.519212] ? refcount_inc_checked+0x70/0x70 [ 970.523739] ? refcount_dec_and_test_checked+0x1b/0x20 [ 970.529017] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 970.534558] ? apparmor_task_getsecid+0x94/0xd0 [ 970.539230] ima_file_check+0xc5/0x110 [ 970.543118] ? process_measurement+0x1570/0x1570 [ 970.547875] ? inode_permission+0xb4/0x570 [ 970.552120] path_openat+0x1130/0x4690 [ 970.556015] ? __lock_acquire+0x53b/0x4700 [ 970.560260] ? getname+0x1a/0x20 [ 970.563631] ? do_sys_open+0x2c9/0x5d0 [ 970.567534] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 970.572210] ? zap_class+0x460/0x460 [ 970.575926] ? find_held_lock+0x35/0x130 [ 970.579987] ? __alloc_fd+0x430/0x530 [ 970.583798] do_filp_open+0x1a1/0x280 [ 970.587605] ? may_open_dev+0x100/0x100 [ 970.591596] ? kasan_check_read+0x11/0x20 [ 970.595747] ? do_raw_spin_unlock+0x57/0x270 [ 970.600162] ? _raw_spin_unlock+0x2d/0x50 [ 970.604323] ? __alloc_fd+0x430/0x530 [ 970.608149] do_sys_open+0x3fe/0x5d0 [ 970.611878] ? filp_open+0x80/0x80 [ 970.615437] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 970.620191] ? do_syscall_64+0x26/0x610 [ 970.624175] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 970.629543] ? do_syscall_64+0x26/0x610 [ 970.633525] __x64_sys_open+0x7e/0xc0 [ 970.637330] do_syscall_64+0x103/0x610 [ 970.641222] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 970.646408] RIP: 0033:0x457e39 [ 970.649621] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 970.668528] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 20:16:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x1000000000000) [ 970.676240] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 970.683505] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 970.690778] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 970.698048] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 970.705315] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:16:05 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x3, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x10000, 0x100) ioctl$sock_bt_cmtp_CMTPCONNADD(r0, 0x400443c8, &(0x7f0000000200)={r1, 0x2}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000380)={'broute\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000080)=[{}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:05 executing program 1 (fault-call:10 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 970.789877] audit: type=1800 audit(1549397765.517:144): pid=5509 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor1" name="file1" dev="overlay" ino=153070 res=0 [ 970.836432] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 970.963863] overlayfs: './file0' not a directory [ 970.990045] overlayfs: './file0' not a directory [ 971.010879] FAULT_INJECTION: forcing a failure. [ 971.010879] name failslab, interval 1, probability 0, space 0, times 0 [ 971.030844] CPU: 1 PID: 5535 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 971.037863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 971.047203] Call Trace: [ 971.049779] dump_stack+0x172/0x1f0 [ 971.053408] should_fail.cold+0xa/0x1b [ 971.057299] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 971.062396] ? kfree+0x173/0x230 [ 971.065786] ? ___might_sleep+0x163/0x280 [ 971.069936] __should_failslab+0x121/0x190 [ 971.074160] should_failslab+0x9/0x14 [ 971.077959] __kmalloc_track_caller+0x2d8/0x740 [ 971.082627] ? kzfree+0x29/0x30 [ 971.085898] ? crypto_destroy_tfm+0x15d/0x300 [ 971.090376] ? ima_collect_measurement+0x375/0x5c0 [ 971.095293] krealloc+0x66/0xd0 [ 971.098558] ima_collect_measurement+0x375/0x5c0 [ 971.103303] ? ima_get_action+0xa0/0xa0 20:16:05 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000f5ffffff00"}, 0x1c) 20:16:05 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0xffffffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:05 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xf0ffffffffffff) 20:16:05 executing program 4: mkdir(&(0x7f0000000240)='./file0\x00', 0x111) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) r1 = msgget(0x0, 0x40) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)) msgctl$MSG_STAT(r1, 0xb, &(0x7f0000000080)=""/50) [ 971.107273] process_measurement+0xeca/0x1570 [ 971.111757] ? ima_add_template_entry.cold+0x48/0x48 [ 971.116843] ? zap_class+0x460/0x460 [ 971.120541] ? do_dentry_open+0x925/0x1130 [ 971.124777] ? lockdep_init_map+0x10c/0x5b0 [ 971.129111] ? aa_get_task_label+0x344/0x680 [ 971.133525] ? find_held_lock+0x35/0x130 [ 971.137610] ? aa_get_task_label+0x344/0x680 [ 971.142035] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 971.147583] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 971.153042] ? refcount_inc_checked+0x70/0x70 [ 971.157556] ? refcount_dec_and_test_checked+0x1b/0x20 [ 971.162838] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 971.168379] ? apparmor_task_getsecid+0x94/0xd0 [ 971.168420] ima_file_check+0xc5/0x110 [ 971.168436] ? process_measurement+0x1570/0x1570 [ 971.181725] ? inode_permission+0xb4/0x570 [ 971.185983] path_openat+0x1130/0x4690 [ 971.189882] ? __lock_acquire+0x53b/0x4700 [ 971.194128] ? getname+0x1a/0x20 [ 971.197495] ? do_sys_open+0x2c9/0x5d0 [ 971.201401] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 971.206073] ? zap_class+0x460/0x460 [ 971.209798] ? __alloc_fd+0x430/0x530 [ 971.213603] do_filp_open+0x1a1/0x280 [ 971.217410] ? may_open_dev+0x100/0x100 [ 971.221397] ? kasan_check_read+0x11/0x20 [ 971.225546] ? do_raw_spin_unlock+0x57/0x270 [ 971.229961] ? _raw_spin_unlock+0x2d/0x50 [ 971.234112] ? __alloc_fd+0x430/0x530 [ 971.237927] do_sys_open+0x3fe/0x5d0 [ 971.241645] ? filp_open+0x80/0x80 [ 971.245205] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 971.249961] ? do_syscall_64+0x26/0x610 [ 971.253933] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 971.259297] ? do_syscall_64+0x26/0x610 [ 971.263277] __x64_sys_open+0x7e/0xc0 [ 971.267082] do_syscall_64+0x103/0x610 [ 971.270978] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 971.276168] RIP: 0033:0x457e39 [ 971.279365] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 971.298266] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 20:16:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 971.305975] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 971.313240] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 971.320504] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 971.327770] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 971.335124] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 971.350480] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 971.408096] audit: type=1800 audit(1549397766.137:145): pid=5535 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor1" name="file1" dev="overlay" ino=154013 res=0 20:16:06 executing program 1 (fault-call:10 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 971.468163] overlayfs: './file0' not a directory [ 971.489484] overlayfs: failed to resolve './file1': -2 20:16:06 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x2}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 971.524317] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 971.530937] overlayfs: failed to resolve './file1': -2 20:16:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x100000000000000) 20:16:06 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) r2 = getpgrp(r1) getpriority(0x1, r2) truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 971.636464] FAULT_INJECTION: forcing a failure. [ 971.636464] name failslab, interval 1, probability 0, space 0, times 0 [ 971.688451] CPU: 1 PID: 5562 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 971.695507] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 971.704862] Call Trace: [ 971.707473] dump_stack+0x172/0x1f0 [ 971.711121] should_fail.cold+0xa/0x1b [ 971.715029] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 971.720149] ? ___might_sleep+0x163/0x280 [ 971.724320] __should_failslab+0x121/0x190 [ 971.725399] overlayfs: './file0' not a directory [ 971.728569] should_failslab+0x9/0x14 20:16:06 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f00000001c0)={0x0, 0x6, [{r0, 0x0, 0x0, 0x4000}, {r0, 0x0, 0xfffffffffffff000, 0xfffffffff0003000}, {r0, 0x0, 0x10000, 0x10000}, {r0, 0x0, 0x0, 0xfffffffffffff000}, {r0, 0x0, 0xfffffffffffff000, 0x2000}, {r0, 0x0, 0xfffff000, 0x1000}]}) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 971.728584] __kmalloc+0x2dc/0x740 [ 971.728608] ? ima_alloc_init_template+0x65/0x3b0 [ 971.728627] ima_alloc_init_template+0x65/0x3b0 [ 971.728655] ima_store_measurement+0x1bc/0x3e0 [ 971.755095] ? ima_collect_measurement+0x5c0/0x5c0 [ 971.760037] ? kmem_cache_alloc+0x341/0x710 [ 971.764395] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 971.769955] ? ima_d_path+0xbf/0x1ee [ 971.773696] process_measurement+0x119e/0x1570 [ 971.778296] ? ima_add_template_entry.cold+0x48/0x48 [ 971.783424] ? zap_class+0x460/0x460 [ 971.787149] ? do_dentry_open+0x925/0x1130 [ 971.791396] ? lockdep_init_map+0x10c/0x5b0 [ 971.795756] ? aa_get_task_label+0x344/0x680 [ 971.800176] ? find_held_lock+0x35/0x130 [ 971.804265] ? aa_get_task_label+0x344/0x680 [ 971.808707] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 971.813334] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 971.814258] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 971.814277] ? refcount_inc_checked+0x70/0x70 [ 971.814303] ? refcount_dec_and_test_checked+0x1b/0x20 [ 971.823877] overlayfs: './file0' not a directory [ 971.827013] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 971.847023] ? apparmor_task_getsecid+0x94/0xd0 [ 971.851714] ima_file_check+0xc5/0x110 [ 971.855610] ? process_measurement+0x1570/0x1570 [ 971.860375] ? inode_permission+0xb4/0x570 [ 971.864628] path_openat+0x1130/0x4690 [ 971.868530] ? __lock_acquire+0x53b/0x4700 [ 971.872770] ? getname+0x1a/0x20 [ 971.876135] ? do_sys_open+0x2c9/0x5d0 [ 971.880018] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 971.884677] ? zap_class+0x460/0x460 [ 971.888390] ? find_held_lock+0x35/0x130 [ 971.892436] ? __alloc_fd+0x430/0x530 [ 971.896224] do_filp_open+0x1a1/0x280 [ 971.900027] ? may_open_dev+0x100/0x100 [ 971.903994] ? kasan_check_read+0x11/0x20 [ 971.908139] ? do_raw_spin_unlock+0x57/0x270 [ 971.912535] ? _raw_spin_unlock+0x2d/0x50 [ 971.916664] ? __alloc_fd+0x430/0x530 [ 971.920519] do_sys_open+0x3fe/0x5d0 [ 971.924226] ? filp_open+0x80/0x80 [ 971.927755] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 971.932493] ? do_syscall_64+0x26/0x610 [ 971.936453] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 971.941802] ? do_syscall_64+0x26/0x610 [ 971.945762] __x64_sys_open+0x7e/0xc0 [ 971.949547] do_syscall_64+0x103/0x610 [ 971.953422] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 971.958606] RIP: 0033:0x457e39 [ 971.961800] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 971.980697] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 971.988390] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 971.995650] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 972.002914] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 972.010173] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 972.017429] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 972.038002] audit: type=1804 audit(1549397766.767:146): pid=5562 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=add_template_measure cause=ENOMEM comm="syz-executor1" name="/root/syzkaller-testdir977161907/syzkaller.R27WR8/168/file0/file1" dev="overlay" ino=154049 res=0 [ 972.130088] overlayfs: './file0' not a directory 20:16:06 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000feffffff00"}, 0x1c) 20:16:06 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:06 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x3}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x200000000000000) 20:16:06 executing program 1 (fault-call:10 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:06 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r1 = fcntl$getown(r0, 0x9) prlimit64(r1, 0x0, 0x0, &(0x7f0000000080)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 972.318202] FAULT_INJECTION: forcing a failure. [ 972.318202] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 972.321646] overlayfs: './file0' not a directory [ 972.330049] CPU: 1 PID: 5595 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 972.330059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 972.330080] Call Trace: [ 972.330119] dump_stack+0x172/0x1f0 [ 972.330156] should_fail.cold+0xa/0x1b [ 972.330169] ? should_fail+0x14d/0x85c [ 972.330187] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 972.330214] ? debug_smp_processor_id+0x1c/0x20 [ 972.330245] ? perf_trace_lock+0xeb/0x510 [ 972.330259] ? mark_held_locks+0x100/0x100 [ 972.330280] should_fail_alloc_page+0x50/0x60 [ 972.330297] __alloc_pages_nodemask+0x1a1/0x710 [ 972.330318] ? __alloc_pages_slowpath+0x2900/0x2900 [ 972.330351] cache_grow_begin+0x9c/0x8c0 [ 972.351437] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 972.361498] ? check_preemption_disabled+0x48/0x290 [ 972.361521] kmem_cache_alloc+0x645/0x710 20:16:07 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707003006469723d2e2f66696c65302c6c6f7765726469723d2e2f666f6c65313f776f726b6469723d2e2f66696c6531"]) r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x800000000) r1 = inotify_init1(0x80800) chdir(&(0x7f0000000280)='./file0\x00') ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000100)={0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000001c0)={r2, 0x80000, r1}) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d00000fc000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x400000000000000) [ 972.361548] ima_d_path+0x52/0x1ee [ 972.407794] overlayfs: './file0' not a directory [ 972.412326] process_measurement+0x11dc/0x1570 [ 972.412353] ? ima_add_template_entry.cold+0x48/0x48 [ 972.412371] ? zap_class+0x460/0x460 [ 972.438167] ? do_dentry_open+0x925/0x1130 [ 972.442414] ? lockdep_init_map+0x10c/0x5b0 [ 972.446749] ? aa_get_task_label+0x344/0x680 [ 972.451167] ? find_held_lock+0x35/0x130 [ 972.455243] ? aa_get_task_label+0x344/0x680 [ 972.459677] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 972.465241] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 972.470715] ? refcount_inc_checked+0x70/0x70 [ 972.475221] ? refcount_dec_and_test_checked+0x1b/0x20 [ 972.480512] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 972.486050] ? apparmor_task_getsecid+0x94/0xd0 [ 972.490727] ima_file_check+0xc5/0x110 [ 972.494616] ? process_measurement+0x1570/0x1570 [ 972.499360] ? inode_permission+0xb4/0x570 [ 972.503587] path_openat+0x1130/0x4690 [ 972.507489] ? __lock_acquire+0x53b/0x4700 [ 972.511711] ? getname+0x1a/0x20 [ 972.515062] ? do_sys_open+0x2c9/0x5d0 [ 972.518958] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 972.523643] ? zap_class+0x460/0x460 [ 972.527366] ? __alloc_fd+0x430/0x530 [ 972.531158] do_filp_open+0x1a1/0x280 [ 972.534957] ? may_open_dev+0x100/0x100 [ 972.538941] ? kasan_check_read+0x11/0x20 [ 972.543074] ? do_raw_spin_unlock+0x57/0x270 [ 972.547472] ? _raw_spin_unlock+0x2d/0x50 [ 972.551604] ? __alloc_fd+0x430/0x530 [ 972.555413] do_sys_open+0x3fe/0x5d0 [ 972.559127] ? filp_open+0x80/0x80 [ 972.562660] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 972.567408] ? do_syscall_64+0x26/0x610 [ 972.571377] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 972.576753] ? do_syscall_64+0x26/0x610 [ 972.580716] __x64_sys_open+0x7e/0xc0 [ 972.584504] do_syscall_64+0x103/0x610 [ 972.588383] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 972.593560] RIP: 0033:0x457e39 [ 972.596740] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 20:16:07 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x4}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 972.615624] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 972.623316] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 972.630568] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 972.637822] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 972.645076] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 972.652339] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:16:07 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:07 executing program 1 (fault-call:10 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 972.845800] overlayfs: unrecognized mount option "upp" or missing value [ 972.870668] overlayfs: './file0' not a directory [ 972.891582] overlayfs: unrecognized mount option "upp" or missing value [ 972.914356] FAULT_INJECTION: forcing a failure. [ 972.914356] name failslab, interval 1, probability 0, space 0, times 0 [ 972.929740] CPU: 1 PID: 5623 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 972.936768] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 972.946118] Call Trace: [ 972.948729] dump_stack+0x172/0x1f0 [ 972.952367] should_fail.cold+0xa/0x1b [ 972.956264] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 972.961379] ? ___might_sleep+0x163/0x280 [ 972.965542] __should_failslab+0x121/0x190 [ 972.969783] should_failslab+0x9/0x14 [ 972.973583] __kmalloc+0x2dc/0x740 [ 972.977136] ? ima_alloc_init_template+0x65/0x3b0 [ 972.981982] ima_alloc_init_template+0x65/0x3b0 [ 972.986664] ima_store_measurement+0x1bc/0x3e0 [ 972.991261] ? ima_collect_measurement+0x5c0/0x5c0 [ 972.996202] ? kmem_cache_alloc+0x341/0x710 [ 973.000538] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 973.006075] ? ima_d_path+0xbf/0x1ee [ 973.009803] process_measurement+0x119e/0x1570 [ 973.014400] ? ima_add_template_entry.cold+0x48/0x48 [ 973.019504] ? zap_class+0x460/0x460 [ 973.023226] ? do_dentry_open+0x925/0x1130 [ 973.027478] ? lockdep_init_map+0x10c/0x5b0 [ 973.031803] ? aa_get_task_label+0x344/0x680 [ 973.036222] ? find_held_lock+0x35/0x130 [ 973.040285] ? aa_get_task_label+0x344/0x680 [ 973.044715] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 973.050255] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 973.055714] ? refcount_inc_checked+0x70/0x70 [ 973.060232] ? refcount_dec_and_test_checked+0x1b/0x20 [ 973.065511] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 973.071047] ? apparmor_task_getsecid+0x94/0xd0 [ 973.075723] ima_file_check+0xc5/0x110 [ 973.079616] ? process_measurement+0x1570/0x1570 [ 973.084376] ? inode_permission+0xb4/0x570 [ 973.088622] path_openat+0x1130/0x4690 [ 973.092509] ? __lock_acquire+0x53b/0x4700 [ 973.096749] ? getname+0x1a/0x20 [ 973.100113] ? do_sys_open+0x2c9/0x5d0 [ 973.104016] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 973.108696] ? zap_class+0x460/0x460 [ 973.112414] ? __alloc_fd+0x430/0x530 [ 973.116223] do_filp_open+0x1a1/0x280 [ 973.120030] ? may_open_dev+0x100/0x100 [ 973.124020] ? kasan_check_read+0x11/0x20 [ 973.128173] ? do_raw_spin_unlock+0x57/0x270 [ 973.132602] ? _raw_spin_unlock+0x2d/0x50 [ 973.136752] ? __alloc_fd+0x430/0x530 [ 973.140584] do_sys_open+0x3fe/0x5d0 [ 973.144302] ? filp_open+0x80/0x80 [ 973.147853] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 973.152606] ? do_syscall_64+0x26/0x610 [ 973.156597] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 973.161988] ? do_syscall_64+0x26/0x610 [ 973.165968] __x64_sys_open+0x7e/0xc0 [ 973.169771] do_syscall_64+0x103/0x610 [ 973.173666] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 973.178862] RIP: 0033:0x457e39 [ 973.182058] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 973.200955] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 973.208660] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 973.215933] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 973.223284] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 973.230552] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 973.237821] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 973.251946] audit: type=1804 audit(1549397767.977:147): pid=5623 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=add_template_measure cause=ENOMEM comm="syz-executor1" name="/root/syzkaller-testdir977161907/syzkaller.R27WR8/170/file0/file1" dev="overlay" ino=153323 res=0 20:16:08 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="00000000000000001000"}, 0x1c) 20:16:08 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x5}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x500000000000000) 20:16:08 executing program 1 (fault-call:10 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:08 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbff, 0x80000400}, 0xc) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 973.402029] FAULT_INJECTION: forcing a failure. [ 973.402029] name failslab, interval 1, probability 0, space 0, times 0 [ 973.420428] overlayfs: './file0' not a directory [ 973.433705] CPU: 0 PID: 5632 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 973.440741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 20:16:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:08 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x6}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 973.450103] Call Trace: [ 973.452731] dump_stack+0x172/0x1f0 [ 973.456380] should_fail.cold+0xa/0x1b [ 973.460289] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 973.465412] ? lock_downgrade+0x810/0x810 [ 973.469577] ? ___might_sleep+0x163/0x280 [ 973.473758] __should_failslab+0x121/0x190 [ 973.478005] should_failslab+0x9/0x14 [ 973.481816] __kmalloc+0x2dc/0x740 [ 973.485369] ? vsprintf+0x40/0x40 [ 973.488831] ? do_filp_open+0x1a1/0x280 [ 973.492818] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe 20:16:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x804000000000000) 20:16:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 973.498196] ? debug_smp_processor_id+0x1c/0x20 [ 973.502873] ? ima_write_template_field_data.isra.0+0x56/0x210 [ 973.508862] ima_write_template_field_data.isra.0+0x56/0x210 [ 973.514675] ima_eventdigest_init_common+0x126/0x250 [ 973.519807] ? prepend_path.isra.0+0xb17/0xfb0 [ 973.524401] ? ima_write_template_field_data.isra.0+0x210/0x210 [ 973.530513] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 973.535980] ? rcu_read_lock_sched_held+0x110/0x130 [ 973.541013] ? __kmalloc+0x5d5/0x740 [ 973.544745] ima_eventdigest_ng_init+0x60/0x150 20:16:08 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x7}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 973.549432] ima_alloc_init_template+0x255/0x3b0 [ 973.554206] ima_store_measurement+0x1bc/0x3e0 [ 973.558822] ? ima_collect_measurement+0x5c0/0x5c0 [ 973.563766] ? kmem_cache_alloc+0x341/0x710 [ 973.568116] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 973.573663] ? ima_d_path+0xbf/0x1ee [ 973.577447] process_measurement+0x119e/0x1570 [ 973.582051] ? ima_add_template_entry.cold+0x48/0x48 [ 973.587181] ? zap_class+0x460/0x460 [ 973.590905] ? do_dentry_open+0x925/0x1130 [ 973.595153] ? lockdep_init_map+0x10c/0x5b0 [ 973.599492] ? aa_get_task_label+0x344/0x680 [ 973.603907] ? find_held_lock+0x35/0x130 [ 973.607981] ? aa_get_task_label+0x344/0x680 [ 973.612452] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 973.618023] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 973.623487] ? refcount_inc_checked+0x70/0x70 [ 973.628003] ? refcount_dec_and_test_checked+0x1b/0x20 [ 973.633284] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 973.638829] ? apparmor_task_getsecid+0x94/0xd0 [ 973.643515] ima_file_check+0xc5/0x110 [ 973.647415] ? process_measurement+0x1570/0x1570 20:16:08 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 973.652185] ? inode_permission+0xb4/0x570 [ 973.656445] path_openat+0x1130/0x4690 [ 973.660349] ? __lock_acquire+0x53b/0x4700 [ 973.664586] ? getname+0x1a/0x20 [ 973.664601] ? do_sys_open+0x2c9/0x5d0 [ 973.664632] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 973.664648] ? zap_class+0x460/0x460 [ 973.664669] ? __alloc_fd+0x430/0x530 [ 973.664705] do_filp_open+0x1a1/0x280 [ 973.671944] ? may_open_dev+0x100/0x100 [ 973.691845] ? kasan_check_read+0x11/0x20 [ 973.696004] ? do_raw_spin_unlock+0x57/0x270 [ 973.700422] ? _raw_spin_unlock+0x2d/0x50 [ 973.704580] ? __alloc_fd+0x430/0x530 [ 973.708405] do_sys_open+0x3fe/0x5d0 [ 973.712132] ? filp_open+0x80/0x80 [ 973.715707] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 973.720474] ? do_syscall_64+0x26/0x610 [ 973.724456] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 973.729827] ? do_syscall_64+0x26/0x610 [ 973.734336] __x64_sys_open+0x7e/0xc0 [ 973.738147] do_syscall_64+0x103/0x610 [ 973.738168] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 973.738180] RIP: 0033:0x457e39 [ 973.738197] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 973.747254] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 973.747269] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 973.747279] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 973.747288] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 973.747298] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 973.747307] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 973.756880] overlayfs: './file0' not a directory [ 973.769840] audit: type=1804 audit(1549397768.477:148): pid=5632 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=add_template_measure cause=ENOMEM comm="syz-executor1" name="/root/syzkaller-testdir977161907/syzkaller.R27WR8/171/file0/file1" dev="overlay" ino=154182 res=0 [ 973.935452] overlayfs: './file0' not a directory 20:16:09 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000000000000000100"}, 0x1c) 20:16:09 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x8}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:09 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000d80)) getegid() fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000003440)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003580)={{{@in=@loopback, @in=@local}}, {{@in6=@ipv4={[], [], @empty}}, 0x0, @in6=@ipv4={[], [], @local}}}, 0x0) fstat(r0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) lstat(0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x80240) unshare(0x40000000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) r1 = getpid() r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') fcntl$setownex(r2, 0xf, &(0x7f0000000080)={0x3, r1}) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:09 executing program 1 (fault-call:10 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x2000000000000000) 20:16:09 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000000100039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 974.372240] FAULT_INJECTION: forcing a failure. [ 974.372240] name failslab, interval 1, probability 0, space 0, times 0 [ 974.393867] overlayfs: './file0' not a directory [ 974.413895] CPU: 1 PID: 5674 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 974.420934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 974.430291] Call Trace: [ 974.432900] dump_stack+0x172/0x1f0 [ 974.436552] should_fail.cold+0xa/0x1b [ 974.440484] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 974.445639] ? lock_downgrade+0x810/0x810 [ 974.449793] ? ___might_sleep+0x163/0x280 [ 974.453962] __should_failslab+0x121/0x190 [ 974.458225] should_failslab+0x9/0x14 [ 974.462042] __kmalloc+0x2dc/0x740 [ 974.462066] ? ima_write_template_field_data.isra.0+0x123/0x210 [ 974.471660] ima_write_template_field_data.isra.0+0x123/0x210 [ 974.477566] ima_eventname_init_common+0x13b/0x1b0 [ 974.482527] ima_eventname_ng_init+0x20/0x30 [ 974.486948] ima_alloc_init_template+0x255/0x3b0 [ 974.491736] ima_store_measurement+0x1bc/0x3e0 [ 974.496363] ? ima_collect_measurement+0x5c0/0x5c0 [ 974.501321] ? kmem_cache_alloc+0x341/0x710 [ 974.505663] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 974.511223] ? ima_d_path+0xbf/0x1ee [ 974.514955] process_measurement+0x119e/0x1570 [ 974.519560] ? ima_add_template_entry.cold+0x48/0x48 [ 974.524690] ? zap_class+0x460/0x460 [ 974.528430] ? do_dentry_open+0x925/0x1130 [ 974.532672] ? lockdep_init_map+0x10c/0x5b0 [ 974.537052] ? aa_get_task_label+0x344/0x680 [ 974.541483] ? find_held_lock+0x35/0x130 [ 974.545554] ? aa_get_task_label+0x344/0x680 [ 974.549979] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 974.555529] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 974.561008] ? refcount_inc_checked+0x70/0x70 [ 974.565526] ? refcount_dec_and_test_checked+0x1b/0x20 [ 974.570816] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 974.576363] ? apparmor_task_getsecid+0x94/0xd0 [ 974.581060] ima_file_check+0xc5/0x110 [ 974.584962] ? process_measurement+0x1570/0x1570 [ 974.589727] ? inode_permission+0xb4/0x570 [ 974.593982] path_openat+0x1130/0x4690 [ 974.597881] ? __lock_acquire+0x53b/0x4700 [ 974.602119] ? getname+0x1a/0x20 [ 974.605494] ? do_sys_open+0x2c9/0x5d0 [ 974.609419] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 974.614104] ? zap_class+0x460/0x460 [ 974.617858] ? __alloc_fd+0x430/0x530 20:16:09 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xa}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:09 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xe}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 974.621676] do_filp_open+0x1a1/0x280 [ 974.625523] ? may_open_dev+0x100/0x100 [ 974.629526] ? kasan_check_read+0x11/0x20 [ 974.629667] IPVS: ftp: loaded support on port[0] = 21 [ 974.633690] ? do_raw_spin_unlock+0x57/0x270 [ 974.633709] ? _raw_spin_unlock+0x2d/0x50 [ 974.633725] ? __alloc_fd+0x430/0x530 [ 974.633756] do_sys_open+0x3fe/0x5d0 [ 974.633774] ? filp_open+0x80/0x80 [ 974.633796] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 974.633812] ? do_syscall_64+0x26/0x610 [ 974.633826] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.633840] ? do_syscall_64+0x26/0x610 [ 974.633861] __x64_sys_open+0x7e/0xc0 [ 974.633879] do_syscall_64+0x103/0x610 [ 974.633899] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 974.633913] RIP: 0033:0x457e39 [ 974.643494] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 974.643503] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 974.643518] RAX: ffffffffffffffda RBX: 00007fee9bf78c90 RCX: 0000000000457e39 [ 974.643531] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 974.651488] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 974.651498] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 974.651507] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 20:16:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xc000000000000000) [ 974.711043] audit: type=1804 audit(1549397769.437:149): pid=5674 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=add_template_measure cause=ENOMEM comm="syz-executor1" name="/root/syzkaller-testdir977161907/syzkaller.R27WR8/172/file0/file1" dev="overlay" ino=154284 res=0 20:16:09 executing program 1 (fault-call:10 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:09 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xf}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 974.998554] FAULT_INJECTION: forcing a failure. [ 974.998554] name failslab, interval 1, probability 0, space 0, times 0 [ 975.017591] CPU: 1 PID: 5709 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 975.024617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 975.024626] Call Trace: [ 975.024653] dump_stack+0x172/0x1f0 [ 975.024679] should_fail.cold+0xa/0x1b [ 975.024715] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 975.024738] ? lock_downgrade+0x810/0x810 [ 975.024761] ? ___might_sleep+0x163/0x280 [ 975.024789] __should_failslab+0x121/0x190 [ 975.024813] should_failslab+0x9/0x14 [ 975.036738] __kmalloc+0x2dc/0x740 [ 975.036764] ? ima_write_template_field_data.isra.0+0x123/0x210 [ 975.036787] ima_write_template_field_data.isra.0+0x123/0x210 [ 975.036809] ima_eventname_init_common+0x13b/0x1b0 [ 975.036831] ima_eventname_ng_init+0x20/0x30 [ 975.036847] ima_alloc_init_template+0x255/0x3b0 [ 975.036872] ima_store_measurement+0x1bc/0x3e0 [ 975.036894] ? ima_collect_measurement+0x5c0/0x5c0 [ 975.036911] ? kmem_cache_alloc+0x341/0x710 [ 975.036936] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 975.044423] ? ima_d_path+0xbf/0x1ee [ 975.044443] process_measurement+0x119e/0x1570 [ 975.044470] ? ima_add_template_entry.cold+0x48/0x48 [ 975.044484] ? zap_class+0x460/0x460 [ 975.044502] ? do_dentry_open+0x925/0x1130 [ 975.044515] ? lockdep_init_map+0x10c/0x5b0 [ 975.044538] ? aa_get_task_label+0x344/0x680 [ 975.053776] ? find_held_lock+0x35/0x130 [ 975.053794] ? aa_get_task_label+0x344/0x680 [ 975.053819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 975.053838] ? refcount_sub_and_test_checked+0x161/0x1f0 [ 975.053856] ? refcount_inc_checked+0x70/0x70 [ 975.053886] ? refcount_dec_and_test_checked+0x1b/0x20 [ 975.053900] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 975.053917] ? apparmor_task_getsecid+0x94/0xd0 [ 975.184128] ima_file_check+0xc5/0x110 [ 975.188044] ? process_measurement+0x1570/0x1570 [ 975.192800] ? inode_permission+0xb4/0x570 [ 975.197048] path_openat+0x1130/0x4690 [ 975.200936] ? __lock_acquire+0x53b/0x4700 [ 975.205172] ? getname+0x1a/0x20 [ 975.208539] ? do_sys_open+0x2c9/0x5d0 [ 975.212440] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 975.217113] ? zap_class+0x460/0x460 [ 975.220830] ? __alloc_fd+0x430/0x530 [ 975.224636] do_filp_open+0x1a1/0x280 [ 975.228445] ? may_open_dev+0x100/0x100 [ 975.232437] ? kasan_check_read+0x11/0x20 [ 975.236585] ? do_raw_spin_unlock+0x57/0x270 [ 975.240997] ? _raw_spin_unlock+0x2d/0x50 [ 975.245142] ? __alloc_fd+0x430/0x530 [ 975.248957] do_sys_open+0x3fe/0x5d0 [ 975.252741] ? filp_open+0x80/0x80 [ 975.256292] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 975.261046] ? do_syscall_64+0x26/0x610 [ 975.265019] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.270379] ? do_syscall_64+0x26/0x610 [ 975.274360] __x64_sys_open+0x7e/0xc0 [ 975.278163] do_syscall_64+0x103/0x610 [ 975.282059] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 975.287245] RIP: 0033:0x457e39 [ 975.290436] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 975.309331] RSP: 002b:00007fee9bf57c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 975.317040] RAX: ffffffffffffffda RBX: 00007fee9bf57c90 RCX: 0000000000457e39 [ 975.324309] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000200001c0 [ 975.331576] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 975.338846] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf586d4 [ 975.346148] R13: 00000000004c3d3c R14: 00000000004d6fc8 R15: 0000000000000005 [ 975.362522] overlayfs: './file0' not a directory [ 975.369032] overlayfs: './file0' not a directory [ 975.395594] audit: type=1804 audit(1549397770.127:150): pid=5709 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=add_template_measure cause=ENOMEM comm="syz-executor1" name="/root/syzkaller-testdir977161907/syzkaller.R27WR8/173/file0/file1" dev="overlay" ino=154325 res=0 20:16:10 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000000000000000200"}, 0x1c) 20:16:10 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 975.455839] IPVS: ftp: loaded support on port[0] = 21 [ 975.487279] validate_nla: 7 callbacks suppressed [ 975.487287] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:11 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x80000000, 0x10000) accept(r0, 0x0, &(0x7f0000000100)) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c806dae08c6d9c21650a00c506135726c6f7765726469723d2e2f66696c65312c"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x9) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:11 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x10}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:11 executing program 1 (fault-call:10 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xf4ffffff00000000) 20:16:11 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000000000000000300"}, 0x1c) [ 977.110397] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 977.177107] overlayfs: './file0' not a directory 20:16:11 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x18}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:11 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xf5ffffff00000000) [ 977.266272] overlayfs: unrecognized mount option "mP Pa5rlowerdir=./file1" or missing value [ 977.309499] overlayfs: unrecognized mount option "mP Pa5rlowerdir=./file1" or missing value [ 977.333676] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:12 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) getresgid(&(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000300)=0x0) r3 = getgid() getgroups(0x5, &(0x7f0000000380)=[0xee01, 0xee01, 0x0, 0xee00, 0xffffffffffffffff]) getgroups(0x6, &(0x7f00000003c0)=[0x0, r0, r1, r2, r3, r4]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:12 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x3c}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 977.486845] overlayfs: './file0' not a directory 20:16:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x2, 0x0) [ 977.538169] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xf6ffffff00000000) [ 977.597274] overlayfs: './file0' not a directory 20:16:12 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x43}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000000600039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 977.748222] overlayfs: './file0' not a directory [ 977.772489] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 977.809363] overlayfs: './file0' not a directory 20:16:12 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000000000000000400"}, 0x1c) 20:16:12 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0x2, 0x6, 0x9}) 20:16:12 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x48}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x4, 0x0) 20:16:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xfeffffff00000000) [ 978.034907] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:12 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000000800039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 978.081653] overlayfs: './file0' not a directory [ 978.084312] overlayfs: './file0' not a directory [ 978.105809] overlayfs: './file0' not a directory 20:16:12 executing program 4: r0 = getpid() r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x800, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x200, 0x1f, 0x5, 0x0, 0x0, 0x8001, 0x80, 0x1, 0x80, 0xffff, 0xc474, 0x1ff, 0x1, 0x5a38, 0xffff, 0x3ff, 0x6, 0xfffffffffffffeff, 0x10001, 0x1, 0x80000000, 0x100000001, 0x10001, 0x7fec, 0x7fffffff, 0x6, 0x8, 0x0, 0x400, 0x3, 0x400, 0x5, 0xd36, 0x6, 0x4, 0x7, 0x0, 0x6, 0x3, @perf_bp={&(0x7f0000000100), 0x8}, 0x10, 0x5, 0xb37, 0x4, 0x0, 0xd84, 0x7}, r0, 0x1, r1, 0x2) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065a9dd4d20a4ac096831726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x5, 0x0) 20:16:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xff0f000000000000) 20:16:12 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x4c}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 978.249182] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 978.264604] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x61}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 978.357875] overlayfs: unrecognized mount option "uppeM h1rdir=./file0" or missing value [ 978.429491] overlayfs: './file0' not a directory [ 978.461753] overlayfs: unrecognized mount option "uppeM h1rdir=./file0" or missing value 20:16:13 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000000000000000500"}, 0x1c) 20:16:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xffffff7f00000000) 20:16:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x63}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x500, 0x0) 20:16:13 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x20000, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000380)={0x7ff, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e24, @rand_addr=0x7}}}, 0x108) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 978.940674] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x68}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:13 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 979.007639] overlayfs: './file0' not a directory [ 979.009062] overlayfs: './file0' not a directory [ 979.023713] overlayfs: './file0' not a directory 20:16:13 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000080)={0x3, 0x0, 0x3, 0x40, 'syz0\x00', 0x41cc}) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f00000001c0)={&(0x7f0000000100)=[0x5, 0x100000000, 0x9, 0x6, 0x8000, 0x8], 0x6, 0x100000000, 0xfffffffffffff801, 0x1ff, 0x7, 0x9, {0x7, 0x7fff, 0x0, 0x1, 0x2, 0x20, 0x2d8, 0x3, 0x308, 0x7, 0x6, 0x9, 0xfff, 0x5c7, "2476c9a2ac8fbd63b1506277bbca26e7a627597c876d110d57ba862ceb3b23c6"}}) 20:16:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xffffffff00000000) 20:16:13 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x6c}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x2000, 0x0) [ 979.136175] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 979.283565] overlayfs: './file0' not a directory [ 979.302641] overlayfs: './file0' not a directory [ 979.308391] overlayfs: './file0' not a directory 20:16:14 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000000000000000600"}, 0x1c) 20:16:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xfffffffffffff000) 20:16:14 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x71}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:14 executing program 4: mkdir(&(0x7f0000000100)='./file1/file0\x00', 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x40000, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x92) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x4, &(0x7f0000000380)=ANY=[]) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) syz_mount_image$f2fs(&(0x7f00000001c0)='f2fs\x00', &(0x7f0000000200)='./file1/file0\x00', 0x5, 0x9, &(0x7f00000017c0)=[{&(0x7f0000000380)="ef99ee763f8c3ef6d1f75988c123bbfca5233383144a21485a5743203fbc8e46627d6a9857c8f74dd57af99d5d62667fcc1387920cbc3fb2f1af73dc585dca76baee29855d7bbd9d410fd17e11c04f57fb0dbfc4fc2ce72e785646e4b7d64c99edf25aef81b019a7f93f2596e54299f9379ae9a6eb5c1b1bca944fa6b213bf62d64a2706d43cedf117882555dda13f3c3a420fc42aba7c2525e293a776a251a9c33ce7f9e311800ceae4649e4c8d59bece57957b6633e4d8174be129feaf863d0c256026f27e2c592502d52b8512105468528c68bbe4911c5fd6a75f96708527fd2b96b0", 0xe4, 0x400}, {&(0x7f0000000240)="12bb648e36cb8a444ca2567a8923acf5d0caaa823ee20a3e3af54fc60a428dfdce4e4e466654b89d273366", 0x2b, 0x9}, {&(0x7f0000000480)="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", 0x1000, 0x4}, {&(0x7f00000002c0)="0268606e61cd388ae6505c9b507480b24d232924f9eaa4c202efe810c44104d2620bf8a8ed07a10e3dd9085f06f1c33a74dc650197ded7b4b8bbe072dd9a801a72ac5af83ccfac319fda3c8606c8425cbc38984f75", 0x55, 0x8}, {&(0x7f0000001480)="33f70de33982bcf400f33dcb9270f46c4d", 0x11, 0x5}, {&(0x7f00000014c0)="b17d1e1906c7d270f261354d9c533435612f44b703df381a0164be35dec04c23a0111d3b66f43ee12ec9b1415d3b54f3d61e332754a3ac3c7e961009bc26ede6c387a98bfd48ba9e9b997cdcf9a44c525d01beece7dd1e943a0dcddb54e2f28c3676863b7e4bcdb2075a0f6185f6f31a9bd299b68497cba1e7cef75a5475dfecc1afca7173c434c5c0bb9c7fc6", 0x8d, 0x2200}, {&(0x7f0000001580)="c22c782f33cfe0dda7794cee352d6fb21de8f62d18c81ccc8ad94da9cfdff96862de8bf41d9da8209004b8fbb8a5c38f27fbde8aa08140bbb55a1abacf5eadc9831e13a93f7c3281d5eb5b8413b281d537cfad0b14af9a6fee178c5f16cfd2bd133450e8432c55c08ebc704bebad6fb277c140f6d5c237061a5a654789bc547904fbbe6b07e904e0d256c941bad51aceb9e5de491e1603bc49e8c9a1b57da305534c5a11", 0xa4, 0x5}, {&(0x7f0000001640)="71fb9b2eaaf459408cc6cf5123bd30848611083ba5a4def1679f2c05ca8f6de53d5383a971517f8f0444d27591747df9cc5a58aa70a3ba45c2e79bfdc2e711ee75d3045120ec8c0223312d94d18fb80801f71d7d98549df5eece8236081fa3504e3592a69b758baff6a3ee15d918df1cc59a70a3b2a3815cfd8320e361e6d07bf52edd03c9d86464c4df5ec5b6b2c8649f59ef11fe77509f1949ddc59071f757462e35c5776d857315129feb944e0d7641d5704ed149b781fa2f3ed4935992d98f4fffe097fe1707b2f33bd442c82fcbae24f30c76a33afcb4d23bc3cfe4f10f1d03692f", 0xe4, 0x7}, {&(0x7f0000001740)="e141af7f88681cf75b2196fc429a81b76578fd80fbf357fb8fd6fc61309394e1f0210aaa7b76e2ef087bab4fa215c5025c03a0db4a8b4ee4792e06da2c8dbbd46167fad424e91d8b9daad610b56dc591f616a292b860c19939d83a54fba2fe3c8e", 0x61, 0x1}], 0x0, &(0x7f00000018c0)={[{@four_active_logs='active_logs=4'}, {@fsync_mode_strict='fsync_mode=strict'}, {@user_xattr='user_xattr'}, {@prjjquota={'prjjquota', 0x3d, 'overlay\x00'}}, {@fastboot='fastboot'}, {@background_gc_off='background_gc=off'}, {@inline_data='inline_data'}, {@whint_mode_off='whint_mode=off'}, {@nouser_xattr='nouser_xattr'}, {@nouser_xattr='nouser_xattr'}], [{@fsuuid={'fsuuid', 0x3d, {[0x3c, 0x39, 0x37, 0x30, 0x61, 0x73, 0x37, 0x77], 0x2d, [0x65, 0x66, 0x63, 0x77], 0x2d, [0x34, 0x63, 0x66, 0x39], 0x2d, [0x35, 0x73, 0x77, 0x63], 0x2d, [0x7f, 0x2504a15baf1965f6, 0x3b, 0x35, 0x37, 0x7b, 0x32, 0x65]}}}]}) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000140)=0x8) 20:16:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x3f00, 0x0) 20:16:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:14 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x73}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 979.906765] overlayfs: missing 'lowerdir' [ 979.919480] overlayfs: './file0' not a directory [ 979.933563] overlayfs: './file0' not a directory 20:16:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0xffffffffffffffff) 20:16:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x1000000, 0x0) [ 979.987632] overlayfs: unrecognized mount option "v?>Y##3J!HZWC ?Fb}jWMz]bf ?sX]v)]{A~OW " or missing value 20:16:14 executing program 4: mkdir(&(0x7f0000000100)='./file1/file0\x00', 0x100000003) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="75707065726469de15010066696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531fc09"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000140)='./file0\x00', 0x0) 20:16:14 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000000e00039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 980.207439] overlayfs: unrecognized mount option "upperdi" or missing value [ 980.221800] overlayfs: './file0' not a directory [ 980.223920] overlayfs: './file0' not a directory [ 980.246107] overlayfs: unrecognized mount option "upperdi" or missing value 20:16:15 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'}, 0x1c) 20:16:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x74}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000000f00039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x2000000, 0x0) 20:16:15 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469721d2e2f66696c6533"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:15 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000480)='/dev/audio\x00', 0x4000, 0x0) inotify_add_watch(r0, &(0x7f00000004c0)='./file0\x00', 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r2 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x101000) write$P9_RREMOVE(r2, &(0x7f0000000400)={0x7, 0x7b, 0x2}, 0x7) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x400, 0x0) ioctl$SG_GET_PACK_ID(r3, 0x227c, &(0x7f00000002c0)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e1766696c65302c6c65726469723d2e2f66696c65312c776f726b6469723d2e2f66696c65310000"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') openat$random(0xffffffffffffff9c, &(0x7f0000000440)='/dev/urandom\x00', 0x400, 0x0) inotify_add_watch(r3, &(0x7f0000000300)='./file0\x00', 0x4) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 980.831088] validate_nla: 4 callbacks suppressed [ 980.831112] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 980.845010] overlayfs: unrecognized mount option "workdir./file3" or missing value [ 980.855621] overlayfs: unrecognized mount option "lerdir=./file1" or missing value 20:16:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x7a}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 980.887410] overlayfs: unrecognized mount option "workdir./file3" or missing value [ 980.890352] overlayfs: unrecognized mount option "lerdir=./file1" or missing value [ 980.909782] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 980.914644] overlayfs: './file0' not a directory 20:16:15 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726569723d2e2f66696c65312c776f726b64ff010000000000006531"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x4000000, 0x0) 20:16:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x114) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) renameat(r1, &(0x7f0000000200)='./file1\x00', r1, &(0x7f00000002c0)='./file0\x00') open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:15 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:15 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xfa}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 981.092532] overlayfs: unrecognized mount option "lowereir=./file1" or missing value [ 981.116136] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 981.128433] overlayfs: unrecognized mount option "lowereir=./file1" or missing value [ 981.145942] overlayfs: './file0' not a directory [ 981.155881] overlayfs: './file0' not a directory 20:16:16 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00'}, 0x1c) 20:16:16 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000080)={0x1, 0x4, [{0x5, 0x0, 0x1}]}) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x5000000, 0x0) 20:16:16 executing program 5: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531a882404d4aa6de34da94a9f3296e13119a18e64d6ddaafb8da91b9096ebc726a1f05"]) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000400)='./file0\x00') link(&(0x7f0000000540)='./file1/file0\x00', &(0x7f00000004c0)='./file1/file0\x00') ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) recvfrom$rxrpc(r0, &(0x7f0000000200)=""/28, 0x1c, 0x0, &(0x7f00000003c0)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e24, 0x1ff, @loopback, 0x80000001}}, 0x24) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x300}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 981.746477] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 981.752734] overlayfs: failed to resolve './file1@MJ4ڔ)nMmگڑ nrj': -2 [ 981.778132] overlayfs: './file0' not a directory 20:16:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000001200039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x500}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 981.794668] overlayfs: failed to resolve './file1@MJ4ڔ)nMmگڑ nrj': -2 [ 981.822716] overlayfs: './file0' not a directory 20:16:16 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x42) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d29c6b60a4e1453dd5895a806000065312c776f726b6469"]) creat(&(0x7f0000000040)='./file1\x00', 0x144) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f00000001c0)='./file0\x00', 0x4004) [ 981.911797] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x20000000, 0x0) 20:16:16 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x600}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 982.057619] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 982.132590] overlayfs: './file0' not a directory 20:16:17 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00'}, 0x1c) 20:16:17 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/mcfilter6\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0xe8) r3 = getuid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000500)={{{@in=@empty, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f0000000600)=0xe8) mount$9p_fd(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='9p\x00', 0x3002, &(0x7f0000000880)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_L='version=9p2000.L'}, {@uname={'uname', 0x3d, ':procwlan1wlan1]selfmime_type'}}, {@access_uid={'access', 0x3d, r2}}, {@noextend='noextend'}, {@aname={'aname', 0x3d, '&'}}, {@version_9p2000='version=9p2000'}, {@access_uid={'access', 0x3d, r3}}, {@aname={'aname'}}]}}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:17 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r1 = fcntl$getown(r0, 0x9) sched_getaffinity(r1, 0x8, &(0x7f0000000080)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x3f000000, 0x0) 20:16:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x700}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 982.681795] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 982.723955] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:17 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xa00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 982.776466] overlayfs: './file0' not a directory [ 982.796615] overlayfs: './file0' not a directory [ 982.803489] overlayfs: './file0' not a directory 20:16:17 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000380)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000580)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) mount$9p_unix(&(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)='./file1\x00', &(0x7f00000001c0)='9p\x00', 0x80000, &(0x7f0000000680)={'trans=unix,', {[{@msize={'msize', 0x3d, 0x8000}}, {@uname={'uname', 0x3d, ')!-$\x00'}}, {@msize={'msize', 0x3d, 0x400}}, {@mmap='mmap'}, {@nodevmap='nodevmap'}, {@access_any='access=any'}, {@access_uid={'access', 0x3d, r1}}, {@nodevmap='nodevmap'}, {@access_uid={'access', 0x3d, r2}}, {@cache_fscache='cache=fscache'}], [{@obj_user={'obj_user', 0x3d, 'overlay\x00'}}, {@obj_role={'obj_role', 0x3d, 'overlay\x00'}}, {@seclabel='seclabel'}, {@hash='hash'}, {@uid_eq={'uid', 0x3d, r3}}, {@subj_type={'subj_type', 0x3d, '#'}}, {@permit_directio='permit_directio'}]}}) 20:16:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0xf6ffffff, 0x0) 20:16:17 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:17 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 982.870078] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 982.997845] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 983.052765] overlayfs: './file0' not a directory [ 983.108026] overlayfs: './file0' not a directory [ 983.141052] overlayfs: './file0' not a directory 20:16:18 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'}, 0x1c) 20:16:18 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xe00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:18 executing program 4: mkdir(&(0x7f0000000080)='./file0\x00', 0x40) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765aa7869723d2e2f8d4216b4554966696c65312c776f2e2211ffff0000000000006531"]) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') statx(r0, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x100, &(0x7f0000000380)) truncate(&(0x7f0000000040)='./file0\x00', 0x0) epoll_wait(r0, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x5) 20:16:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e06000000000000006f7765726469723d2e2f66696c65312c776f8f6b6469723d2e2f66696c6531"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0xfeffffff, 0x0) [ 983.635473] overlayfs: unrecognized mount option "lowexir=./BUIfile1" or missing value [ 983.657442] overlayfs: missing 'lowerdir' 20:16:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000004c00039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 983.677564] overlayfs: unrecognized mount option "lowexir=./BUIfile1" or missing value 20:16:18 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xf00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 983.716825] overlayfs: './file0' not a directory 20:16:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:18 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469763d2e0e66696c6530416c6f7765726469723d2e2f6613776f726b6469723d2e2f66696c65312f6fb7e147cea3ad49365a2899f8b23cd2d5a00c21b4221047e738c8e7e4a40e1fd79c665fc0c56600c2cb44e34b6863fbe8d1a5b0b09706dd21815627b4a4b2bca34d059770c9b01050e3e928d68b0c6335b5ef8891acbab8a7808192935a074ae0c9fe4355057cd7c7f269ead651ccaec7d4d8854d3a13ef7b1104bb2c9e21b81664882e29f565f8ebd9272d0515fe0f679e02b72bd9052356ef9b75221917b6046611ec077e72d445025679563da9db27089977643b30a65210f45eab4130"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0xfffffff6, 0x0) 20:16:18 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 983.921820] overlayfs: unrecognized mount option "upperdiv=.file0Alowerdir=./fworkdir=./file1/oGΣI6Z(<ՠ !"G8לf_f" or missing value [ 983.928013] overlayfs: './file0' not a directory [ 983.996176] overlayfs: './file0' not a directory 20:16:19 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000000000000000e00"}, 0x1c) 20:16:19 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x1018}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00', 0xfe, "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"}, &(0x7f0000000200)=0x122) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0xfffffffe, 0x0) 20:16:19 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="757070657264697290ac04c38c9afa8ab98c3d2e2f66696c65302c6c6f7765724469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531642b19261f0b60a0e1ebd6ea4b628e4fd3ce12847533ee5fe1001162e8d7718b3b85a8d4d2bb91eeb13ebaf7bb7591bda11cebe23ceed01ec475dacb5ae775777b100ebdc9ffb7c090890a213a6307cd5a761c340f631ce4f87e1756cb680bf8e2288509081d17deeb80b6086501cf7fdbb2cabb03e29fbf751118d6cd5d953f59e5cc47a90dcf7b8322d4b7ad4a1b38222a19db02a3d341c9d673347a8130e2110e00984f132c2a7d59deef9cf788a990ee0e91e564f96ac9809011cb10e3bfed1f844a63a381e83354806974ec32b64edce19f3d65747c27bd5e9cd07c29"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) open(&(0x7f0000000080)='./file0\x00', 0x20040, 0x4) 20:16:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 984.588840] overlayfs: unrecognized mount option "upperdirÌ=./file0" or missing value [ 984.619187] overlayfs: unrecognized mount option "upperdirÌ=./file0" or missing value 20:16:19 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x1800}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 984.643978] overlayfs: failed to resolve './file1': -2 20:16:19 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:19 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x1000000000000, 0x0) 20:16:19 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x1810}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 984.863991] overlayfs: './file0' not a directory [ 984.909377] overlayfs: './file0' not a directory 20:16:20 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000000000000001000"}, 0x1c) 20:16:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f00000002c0)='./file1/file0\x00', 0x10000000) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302cdb377765726469723d2e2f66696c65313c776f726b6469723d2e2f66c244483b"]) r1 = creat(&(0x7f0000000340)='./file2\x00', 0xc) chdir(&(0x7f0000000280)='./file0\x00') ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000200)) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x21a000, 0x0) 20:16:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:20 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f00000001c0)={0x2, r1}) mkdir(&(0x7f0000000080)='./file2\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:20 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x2000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x100000000000000, 0x0) 20:16:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:20 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x3c00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 985.542477] overlayfs: failed to resolve './file1': -2 [ 985.572033] overlayfs: failed to resolve './file1': -2 20:16:20 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75f6c3d1a2103b0fa2920c44df707065726469723d2e2f66696c65302c6c6f776572646997a9ad1c939436723d2e2f6669"]) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000100)='./file0\x00', 0x1) inotify_add_watch(r0, &(0x7f0000000080)='./file1\x00', 0x403) ioctl$VIDIOC_OVERLAY(r0, 0x4004560e, &(0x7f0000000040)=0xffff) [ 985.598719] overlayfs: './file0' not a directory 20:16:20 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/mixer\x00', 0x20000, 0x0) write$UHID_CREATE2(r1, &(0x7f00000003c0)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0x7e, 0x1ff, 0x7, 0x1b74, 0xfffffffffffffffd, 0x61ab, "bb9e32cbb3d405a2e780a14f2d5ccc9e22446172a813eaef1c0a76589caa660d3f658ab6d156a97702c11ef71940667bf2dd953f338643cf3ff1796f00e3eb7041e4be213a152098555da01d9df32892db617c2dbbd1f392d57730dabf91de2d8f9c3b3ff22de0f6eedfa975d929240f313abbc8c91a362c8470cd129b7f"}, 0x196) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="9670706c65302c3f6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) r2 = getpid() migrate_pages(r2, 0x0, &(0x7f0000000200)=0x2e41, &(0x7f00000002c0)=0x1) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x200000000000000, 0x0) 20:16:20 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 985.739067] overlayfs: unrecognized mount option "uѢ; Dpperdir=./file0" or missing value [ 985.768909] overlayfs: unrecognized mount option "pple0" or missing value [ 985.810590] overlayfs: unrecognized mount option "pple0" or missing value [ 985.812037] overlayfs: unrecognized mount option "uѢ; Dpperdir=./file0" or missing value [ 985.925321] overlayfs: './file0' not a directory 20:16:21 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'}, 0x1c) 20:16:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x3f00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000008100039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") delete_module(&(0x7f0000000200)='overlay\x00', 0xa00) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) creat(&(0x7f00000005c0)='./file1\x00', 0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="75707065726469723d2e2f66836c65302c6c6f77656b6469723d0000000100000000000000000000000000000000000000000970d94a"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000580)=0x1, 0x4) socket$l2tp(0x18, 0x1, 0x1) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) syz_read_part_table(0x401, 0x3, &(0x7f0000000500)=[{&(0x7f00000002c0)="8c3c68aa5ef60cda95f425253937", 0xe, 0x4}, {&(0x7f00000003c0)="9fee2483dab84745a10f485da75d0d8022a4d8e19d8892ebd0279cf1dbf6828592a59c7f81e7661c761d48f28513ccb41ef0406f9e3f5343a3f922339be2cf5cefcd22a5125a6bbafcb060ff9c045f45729d2a8f7fff5bdedbcf3c63eb1c9ac459971cdb7810b0471aa77e8a6bc14dcdef7d7e238d4338c2a6471fdf5abe629f826a92261ac72a3fa82fe031c4bc5e8ae2911bfe8dd14737bb6a7aa11eebc9c213a579efde9e17ea6e28793a74943fb5f399c670e8363e2e6983", 0xba, 0x5}, {&(0x7f0000000480)="89665f617379093aa89bfab81b3c57d5cfba3b3b8caecfd5596bde405a52ac8cde24c40a3625d22d586b92da5344cf570737a2713f1b91dc7900929e214ac8169fb9421d8a7e91fecc5bda095f2fd8d21783c93023aafb8fca4d7ada90bc85728baf65c0ee1c15b41b7ac6", 0x6b, 0x40}]) 20:16:21 executing program 4: exit(0x7) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x20000) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x400000000000000, 0x0) [ 986.424457] validate_nla: 11 callbacks suppressed [ 986.424466] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 986.451955] overlayfs: unrecognized mount option "lowekdir=" or missing value 20:16:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x4000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 986.501683] overlayfs: './file0' not a directory 20:16:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 986.534455] Dev loop5: unable to read RDB block 2 [ 986.539587] loop5: unable to read partition table [ 986.569312] loop5: partition table beyond EOD, truncated 20:16:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x500000000000000, 0x0) 20:16:21 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x4300}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 986.590824] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 986.614581] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 986.657398] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 986.699837] overlayfs: unrecognized mount option "lowekdir=" or missing value [ 986.728155] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:21 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 986.788364] overlayfs: './file0' not a directory [ 986.794339] Dev loop5: unable to read RDB block 2 [ 986.808754] loop5: unable to read partition table [ 986.827264] loop5: partition table beyond EOD, truncated [ 986.843081] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 986.875338] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 987.004055] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 987.267621] overlayfs: './file0' not a directory 20:16:22 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, 0x1c) 20:16:22 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x4800}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x2000000000000000, 0x0) 20:16:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r1, 0x80045500, &(0x7f0000000200)) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:22 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x40) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000100)={0x0, 0x3, 0x6, [0x7, 0x89e, 0x1000, 0x7fff000, 0x4ff, 0x74]}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000200)={0x10001, 0x8, 0x2, 0x3, 0x2, 0x3, 0x3, 0x0, 0x0}, &(0x7f0000000240)=0x20) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000380)={r1, 0x1, 0x3, 0xf330, 0x25d, 0x7fffffff, 0x7, 0x2, {r2, @in6={{0xa, 0x4e23, 0x3, @mcast1, 0x9f}}, 0x7, 0x1, 0x10001, 0x401, 0x1ff}}, &(0x7f00000002c0)=0xb0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 987.375128] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:22 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x4c00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:22 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d000fffffff500039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 987.453792] overlayfs: './file0' not a directory [ 987.458319] overlayfs: './file0' not a directory [ 987.496090] overlayfs: './file0' not a directory 20:16:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x3f00000000000000, 0x0) 20:16:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2eaf665e3a045c1960dda4e746a0cfcc33f65f6c9c127b0c4ef7696c65312c"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') r1 = msgget(0x0, 0x4a2) msgctl$IPC_STAT(r1, 0x2, &(0x7f00000003c0)=""/4096) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:22 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="757070657264696d3d2e2f66696c65302cec6f7765726469723d2e1014602f66696c65312c776f726b080000002e2f66696c6531"]) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x0, 0x0) write$P9_RSTATFS(r0, &(0x7f00000001c0)={0x43, 0x9, 0x2, {0x8, 0x8, 0x20, 0x0, 0xffffffffffff1200, 0x1, 0x9, 0x0, 0x6}}, 0x43) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:22 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x6100}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 987.554629] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 987.699447] overlayfs: unrecognized mount option "upperdim=./file0" or missing value [ 987.720468] overlayfs: unrecognized mount option "upperdim=./file0" or missing value [ 987.728635] overlayfs: missing 'workdir' [ 987.763103] overlayfs: './file0' not a directory [ 987.772384] overlayfs: missing 'workdir' 20:16:23 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00'}, 0x1c) 20:16:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d000000000fc00039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:23 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x6300}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:23 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file1\x00', 0x1) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0xf6ffffff00000000, 0x0) 20:16:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000003c0)="0adc00003c12f91825fd87cba617d5289710cb22880691608d0af0398403ecfc1e8c7008bdbf40983ae7bf21659a1734751a64424c16f442b1d59a38345e55f5a35ed2d4acee7b30c66783759cded00f2512bb69ccd8020019db74cded040cf84c4be9c36a8323794598afb75ca55579664bd1eb2ae3beb804cef2586d473918fd2aed84a37bf335debbd0c236d6fbecdacbb39b8152e620490bd9") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f77657261695d3d2e2f66696c65312c776f726bbc85dd0c046531"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000140)={0xffffffff, 0x2, 0x7, 0x1, 0x3ff, 0x20, 0x101, 0x4, 0xb733, 0x200, 0xfffffffffffffffe}, 0xb) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 988.313628] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 988.338911] overlayfs: unrecognized mount option "lowerai]=./file1" or missing value 20:16:23 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000c80)=""/4096, 0x1000) 20:16:23 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x6800}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 988.386536] overlayfs: './file0' not a directory 20:16:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 988.410094] overlayfs: unrecognized mount option "lowerai]=./file1" or missing value 20:16:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0xfeffffff00000000, 0x0) 20:16:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) recvmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001240)="2e0000002a00815fe45ac187185095cf0800b0eba0b4d65cdbaa98cbb30007fff00000000000000051894d5d1dac", 0x2e}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c77060000006931fda417d079978fc8c7f1213ab84ceffa6c668cc9e8d0f7a3a22b8a512f76058314521cde62ae465c83806b91e253a35905ccba5fe701ab7ac296816bbea3fcf1f24ae09e8ae49f38bd7bf587eca96842ab4726f2d053f708575eb5932379f3ea080c89b4df24b15fb6c91745cdfa25e473f8000000000000000090828698b3efd2b2dfad85459681"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f00000002c0)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x2000000600, 0x0) [ 988.512612] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 988.527645] overlayfs: './file0' not a directory 20:16:23 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000100)='./file1/file0\x00', 0xfffffffffbfffffc) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 988.631550] overlayfs: './file0' not a directory [ 988.658335] overlayfs: unrecognized mount option "w" or missing value [ 988.718805] overlayfs: unrecognized mount option "w" or missing value [ 988.753493] overlayfs: './file0' not a directory 20:16:23 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00`\x00'}, 0x1c) 20:16:23 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x6c00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:23 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0xffffffff00000000, 0x0) 20:16:23 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x100, 0x0) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000400), &(0x7f0000000440)=0x4) ioctl(r0, 0x79, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYPTR64=&(0x7f0000000480)=ANY=[@ANYRESOCT=r0]]) r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) accept4(r2, &(0x7f00000005c0)=@caif=@rfm, &(0x7f0000000640)=0x80, 0x80000) chdir(&(0x7f0000000200)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') r3 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x400, 0x0) linkat(r2, &(0x7f0000000280)='./file0\x00', r3, &(0x7f0000000300)='./file0\x00', 0x1000) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) mount(&(0x7f00000004c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000500)='./file1\x00', &(0x7f0000000540)='devpts\x00', 0x1025082, &(0x7f0000000580)='vmnet0\x00') open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:23 executing program 4: uselib(&(0x7f0000000ac0)='./file1/file0\x00') mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f6d696c65302c6c6f7765726469723d2e2f46696c65172c776f726b6469723d2e2f66696c6d31"]) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) r1 = getpid() stat(&(0x7f00000008c0)='./file1\x00', &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000a80)={&(0x7f0000000380)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000800)=[{&(0x7f0000000400)="802dab508869fe6c7f1aa19d4699f60907d30007f044fc095cca90da20d2e3eb3cdcf789672b4b898ea23e48d6a35b3ec5832f03fc1400b4703a9bbbceb704d847832ea7", 0x44}, {&(0x7f0000000300)="d4bf58a31d65d216b38371c89b5b7f9c541de4806a2e7812dc9f98cb67c9dcd587fe66063e1472ee431d60f50979ec7e58e8098d56c51e766f", 0x39}, {&(0x7f0000000480)="ff30a0f482e5717f3345117968ec515f871c5834134b56f0b4d6bc105dca41529791eac489fb9b3a8cf244620521e86aee2907989bf13a2301481106ecd288638159715bd620ac54e91e6d429935804c676383e355f885c54c9e39df3245b29f61e4c01054d101ef8041c4c90e4c1d9fd00077efb9d58971aaa9f08ae70c7f1ddcd4ad68ac4a7faa4eeae81f7e", 0x8d}, {&(0x7f0000000540)="b7d37a1c526f31fbd741cf9ecd324bdc0a1fa361f9da0b20654ac023ccdb629b3160e466e70a1f100a1d9d7787e83a5dc02d005b86198bc49b8784ee80089e24058b226b6bbecf6d04a4518dc2d2f7b9f8b9ab0bfd903e6d6766f90e0b4c1a3fbef971987f0d8a4ca3cb3e02f1d9c49f6b9299bcb217addabc2889477bf0331a98aaee91019cee1f101f0903b40f6af6a2d7605a84e5e4382cac337dfabe49", 0x9f}, {&(0x7f0000000600)="2541aaec17669d07b28695686130a6bd0f8e737b5e6e6ef2a0004aa0dd4af049618b8438e55431857cad6ddfc9edacdd97da042617683b9bd74392df46b8009a81bd153a464f2ddcbe44c3e9f67e9020f3c26c4fb48c96cfcda5405f1d063d01ec21cdb097247cf5df18a633dd3faeb9193e72b8adf27f9ff19c8359075f3966e1f9b8a96541d9caa0d99299e3d6d9ca4b510090c368a623dd10b91c4aa4b4566b3483e2340577cb47c86eaeb3efac6f898eea85606db49d9b5a9495d3fea93cb6b467c721188d3a49e44be743a3a7e9", 0xd0}, {&(0x7f0000000700)="224bd32347277cc77508c89c7f934d2decb268a9742c618fff1eda6e52e3c2505a400b84e335", 0x26}, {&(0x7f0000000740)="d705522274b47769664f67a5be0f1c938ab0bb3ca5ad3f11f2557b10f5f6a4f55d6aa9923c", 0x25}, {&(0x7f0000000780)="09b4348d681056032ddc7a913ee370f6b7189942ffe49abe3f50090412aa265a16cb3ff8ac350dd431dd49ea5f0bb9b074d341713fc365ab54e4a898b98fb4a673b6d5a8d6b977c8c39e5fae5cc2417a048043e938784e267f45a3319d6f36f87df991b87f24e136f86943f97735cab999e5829d93ae25af38b4d651ba", 0x7d}, {&(0x7f0000000c80)="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", 0x1000}], 0x9, &(0x7f0000000a00)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @rights={0x18, 0x1, 0x1, [r0, r0]}, @cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x18, 0x1, 0x1, [r0]}], 0x70, 0x24000000}, 0x890) mount$overlay(0x0, &(0x7f0000000200)='./file1/file0\x00', &(0x7f0000000240)='overlay\x00', 0x80, &(0x7f00000002c0)=ANY=[@ANYBLOB='y=on,obj_role=vboxnet0,smackfsroot=]vboxnet1[),\x00\x00\x00\x00\x00\x00\x00\x00']) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000080)='./file1/file0\x00', 0x0, 0x18}, 0x10) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f00000000c0)={@bcast, @default, 0x2, 0x76}) [ 989.227144] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 989.267964] overlayfs: failed to resolve './mile0': -2 [ 989.277049] overlayfs: unrecognized mount option "" or missing value [ 989.304230] overlayfs: failed to resolve './mile0': -2 20:16:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:24 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x7100}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 989.317979] overlayfs: './file0' not a directory [ 989.329647] overlayfs: unrecognized mount option "" or missing value 20:16:24 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f00696c65302c6c6f7765fc6469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') write$smack_current(r1, &(0x7f00000001c0)='overlay\x00', 0x8) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f0000000200)='./file1/file0\x00', 0x5fe, 0x0) 20:16:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x2) [ 989.441657] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 989.495742] overlayfs: missing 'lowerdir' [ 989.534528] overlayfs: missing 'lowerdir' [ 989.689858] overlayfs: './file0' not a directory 20:16:24 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000000000000ffffff8d00"}, 0x1c) 20:16:24 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x7300}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:24 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x0, 0x2) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000100)={0x9, 0x5, 0x10001, 0x401}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x4) 20:16:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') bind$unix(r1, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 990.139965] overlayfs: './file0' not a directory [ 990.159113] overlayfs: './file0' not a directory 20:16:24 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 990.185830] overlayfs: './file0' not a directory 20:16:24 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x7400}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x5) 20:16:25 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='uppr=./file0,lowerdir=./file1,workdir=./file1\x00\x00\x00\x00']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 990.353964] overlayfs: './file0' not a directory [ 990.424458] overlayfs: unrecognized mount option "uppr=./file0" or missing value [ 990.425250] overlayfs: './file0' not a directory [ 990.459968] overlayfs: unrecognized mount option "uppr=./file0" or missing value 20:16:25 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000000000000fffffff500"}, 0x1c) 20:16:25 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x7a00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x500) 20:16:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d000f0ffffff00039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000200), &(0x7f00000002c0)=0x4) 20:16:25 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file2\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="757070654adb000039a3b45c6469723d2e2f76696c65302c6c6f7765726469723d553666696c6531ba428432982c776f726b646972"]) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000380)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x0, r1, 0x30, 0x1, @in6={0xa, 0x4e22, 0x6, @ipv4={[], [], @loopback}, 0x3}}}, 0xa0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 991.004242] overlayfs: './file0' not a directory 20:16:25 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x80000, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000100), 0x8) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000001c0)={0x0, @dev, @loopback}, &(0x7f0000000200)=0xc) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000480)={@ll={0x11, 0xff, r2, 0x1, 0x0, 0x6, @random="da596fc8b2e2"}, {&(0x7f0000000380)=""/235, 0xeb}, &(0x7f0000000240), 0x4}, 0xa0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 991.027159] overlayfs: './file0' not a directory 20:16:25 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xfa00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000200)='./file1\x00', r1}, 0x10) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:25 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x2000) 20:16:25 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 991.187462] overlayfs: './file0' not a directory [ 991.301853] overlayfs: unrecognized mount option "workd/f«" or missing value [ 991.334498] overlayfs: './file0' not a directory [ 991.370429] overlayfs: unrecognized mount option "workd/f«" or missing value 20:16:26 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000000000000000000fc00"}, 0x1c) 20:16:26 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000080)='./file1\x00', 0x100) recvfrom$unix(r0, &(0x7f0000000100)=""/13, 0xd, 0x20, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000240)={0x2, [0x7ff80000000000, 0x0]}, &(0x7f00000002c0)=0x8) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xff00}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x3f00) 20:16:26 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000040)=0x6) link(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file1/file0\x00') lsetxattr$security_ima(&(0x7f0000000200)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x3) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 991.890991] validate_nla: 8 callbacks suppressed [ 991.891001] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x97d3a}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:26 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=.rdir=./fiile1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0xf}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f0000000200)={0x12, 0x10, 0xfa00, {&(0x7f0000000080), r0}}, 0x18) chdir(&(0x7f0000000280)='./file0\x00') r1 = accept4$netrom(0xffffffffffffffff, &(0x7f00000002c0)={{0x3, @rose}, [@rose, @rose, @null, @remote, @remote, @bcast, @netrom]}, &(0x7f0000000180)=0x48, 0x800) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x14, r3, 0x20d, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000040}, 0x20048004) truncate(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$KVM_SET_BOOT_CPU_ID(r1, 0xae78, &(0x7f0000000340)) 20:16:26 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000003000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 991.936042] overlayfs: filesystem on './file0' not supported as upperdir [ 991.955789] overlayfs: './file0' not a directory [ 991.975751] overlayfs: './file0' not a directory 20:16:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) sendto$inet(r0, &(0x7f0000000c80)="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", 0x1000, 0x0, 0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:26 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x1000000) 20:16:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x99550}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 992.066882] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 992.134560] overlayfs: missing 'lowerdir' [ 992.154242] overlayfs: missing 'lowerdir' [ 992.252479] overlayfs: unrecognized mount option "u'opper" or missing value [ 992.268449] overlayfs: './file0' not a directory [ 992.292376] overlayfs: unrecognized mount option "u'opper" or missing value 20:16:27 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000000000000000080fe00"}, 0x1c) 20:16:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:27 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x4, 0x200000) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000100)={0xbe, 0x1, 0xb0d, 0x9, 0x19, 0x2, 0x100000001, 0xffff, 0xffffffffffffffc3, 0x0, 0x3, 0x6000000000000000}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='uppertir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x100000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x2000000) 20:16:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531a8e4cc5e7458c38c2ad9eb3a74647f8a01be722fec2abca3f043b3700282cf64f2c893944e635ebc11371c93922c837d03085727af899a8281a44b71c05d9157c727ee46e0a71df1d1cc11f1cc1cd9b7eb4cf5a10944d0be947515a60973de5048a10b512dbe535f0427c5a8989f01366d07c483146efe54d828769e3d40db3fba40d49f58ba114efa9c2f9759bb382ebd8eb13341e878d95175dc1a6880cb"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 992.793526] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 992.818778] overlayfs: unrecognized mount option "}W'Kq]W'FٷL Dоu sPH Q-S_'Ũ6mănT(v=@?@ԟXN/Y8.3AxQuh" or missing value [ 992.841203] overlayfs: unrecognized mount option "uppertir=./file0" or missing value [ 992.854289] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 992.865448] overlayfs: unrecognized mount option "}W'Kq]W'FٷL Dоu sPH Q-S_'Ũ6mănT(v=@?@ԟXN/Y8.3AxQuh" or missing value 20:16:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 992.891178] overlayfs: './file0' not a directory [ 992.894205] overlayfs: unrecognized mount option "uppertir=./file0" or missing value 20:16:27 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="7570706538ed93766ac7f69506ccf09966696c65302c6c6f776572d3357c85a4edae55611c650000000000000000000000"]) mknod(&(0x7f0000000200)='./file0\x00', 0x2, 0x3ff) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x4000000) [ 992.970777] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:27 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x3) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file1\x00', 0x8e) 20:16:27 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 993.066213] overlayfs: unrecognized mount option "uppe8vjfile0" or missing value 20:16:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x400000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 993.131595] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 993.188542] overlayfs: unrecognized mount option "uppe8vjfile0" or missing value [ 993.197223] overlayfs: './file0' not a directory [ 993.221869] overlayfs: './file0' not a directory 20:16:28 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000000000000c0fe00"}, 0x1c) 20:16:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:28 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e22, 0x6, @rand_addr="cd5e68a11fc9971bcfc023cd42c1129d", 0xfffffffffffffffe}}, 0x6d, 0xfffffffffffff000}, &(0x7f0000000100)=0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)={r1, 0xa8, "71b8bd5941a463dd7a72c9f7d0d92d54ddf8933c0e8a54a70d0486b0ba90215ddd0005c0b180549bf33507d721b0079a3afa86f707ebc8bb940fda24760e944973ff9e2e70d1cf639ea6327cae6f671d49cba31e366bed98c91217f12a0ee15a30a8ee07af909202c5bdb64bc027b6715371b6e438c7244ad57419644b368cd739e146479d49bc0b9b10dc68749b64d5632066e59532680cefeea1009896578a15fe076b5decd146"}, &(0x7f00000002c0)=0xb0) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000300)={r2, 0xf554}, &(0x7f0000000440)=0x8) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000080)=0x15) sendmsg(r0, &(0x7f0000000700)={&(0x7f0000000480)=@can, 0x80, &(0x7f0000000540)=[{&(0x7f0000000500)="be4028284abb814d3ce275fb736e1bea36f1c3ef9c4dfbed742d2321c7a7a1f76f12fad032b3cf22df9b44c101", 0x2d}], 0x1, &(0x7f0000000580)=[{0x78, 0x11b, 0x7ff, "7b78bafd291d1460e0da4d95d3dc7cca1a4eb975fbc14e37802f2e9c5f9f5bfd0af5a24001f2ca4708c8810969c1e594def29e8cd2be8f25848ccbb36e372b6984201b97207f95b9853ad44c115348d809bace8fdc84cf24519d89321da99b58a20f6f01"}, {0xf0, 0x11d, 0xfffffffffffff001, "38d31d69ba2992ece2163bde3f40ecc3d7551f138e20f0f26a3d386a69b88ae9864405fe8c6cf452c486c88eb03d1850bee0d98c3d360d022a336a514e5433695aa321fd0fbb6d221497d04575866acea02929373147951b276e4f5f0cff79b2d85825d0689b75aa647b22b3f00c8a05978acf0347f31752d2b41c2d78a8c439e34ac48a026f6fb2b7dc76bf2fa402ef0df2b95f6a24d36c98da07ffdf332bc4edf8863854cc516b3dc765a13ae46c39175090ca817105c2f1403a5078dc510fea617addf4564b9ebaafed92a44e2dff9a0f459017d1c9e769452637"}], 0x168}, 0x40800) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x5000000) 20:16:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$dupfd(r0, 0x0, r0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="757070657264698c3d2e2f66696c65302c6c6f7765726469723d2e69723d2e2f66696c653100000000ed000e77cae88c6f57436f21b16e16126426"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f00000003c0)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x80ffff}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 993.729476] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 993.736483] overlayfs: unrecognized mount option "upperdi=./file0" or missing value [ 993.762907] overlayfs: './file0' not a directory [ 993.764124] overlayfs: './file0' not a directory 20:16:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x1000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x20000000) [ 993.796388] overlayfs: unrecognized mount option "upperdi=./file0" or missing value 20:16:28 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:28 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,l\x00\x00\x00\x00\x00\x00\x00\x00./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:28 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x2) r1 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, r1) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000200)={0x7, 0x0, 0x9, 0x10001, 0xb0d}, 0x14) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r2, 0xc0206434, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x81}) ioctl$DRM_IOCTL_SG_FREE(r2, 0x40106439, &(0x7f0000000300)={0x1, r3}) 20:16:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x2000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 993.906606] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 994.013583] overlayfs: unrecognized mount option "l" or missing value [ 994.049745] overlayfs: unrecognized mount option "l" or missing value [ 994.081311] overlayfs: './file0' not a directory [ 994.101542] overlayfs: './file0' not a directory 20:16:29 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000000000000000000ff00"}, 0x1c) 20:16:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x3000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:29 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531aaa9aafb24b841b05fc0417044bf2374f725acd3bb972bfb625080bd6e5aedb054e12021c232c48cde8b3450505b94c76c43b6ecf4053bfc865489437fd97064cec21151907176fe324c00a883b59a8ac04093856844ac05292eb0a8adade922cea30349901dc779fe28175cf05fa496d03ded572d3bc68747f15bc9d63a788177bf83d47042e532d4b6a1cc97e9c67f2c"]) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="75707065726469723d2e3866696c65302c6c6f7765726469723d2e2f66696c65312c776f726bd329213f2e2f66696c6531e8897bc69e8621089e1f9768ec79a5528cbe542149fcade798706dac85ea506b9334529b5ba7b3ef4a44f4b61ae7b639baa55fe48c14df012f00c4447329e78a8f5b5d1c04c6c0660cd7abecba4b5464"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0, 0x0}, &(0x7f00000004c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) mount$9p_unix(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file1\x00', &(0x7f0000000300)='9p\x00', 0x400, &(0x7f0000000580)={'trans=unix,', {[{@debug={'debug', 0x3d, 0x3}}, {@version_9p2000='version=9p2000'}, {@noextend='noextend'}, {@version_L='version=9p2000.L'}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@dfltgid={'dfltgid', 0x3d, r3}}, {@debug={'debug', 0x3d, 0x400}}, {@cachetag={'cachetag', 0x3d, 'overlay\x00'}}, {@version_L='version=9p2000.L'}], [{@audit='audit'}]}}) 20:16:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x3f000000) [ 994.625715] overlayfs: unrecognized mount option "work)!?./file1{ƞ!hyRT!IpmPk4R[JD9_/" or missing value [ 994.639658] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 994.659568] overlayfs: failed to resolve './file1$A_ApD#t%ӻ+bPnZT !2Čދ4PP[lC;TCpdQqv2L': -2 20:16:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 994.688881] overlayfs: './file0' not a directory 20:16:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x4000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:29 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0xf6ffffff) [ 994.717260] overlayfs: failed to resolve './file1$A_ApD#t%ӻ+bPnZT !2Čދ4PP[lC;TCpdQqv2L': -2 [ 994.735044] overlayfs: unrecognized mount option "work)!?./file1{ƞ!hyRT!IpmPk4R[JD9_/" or missing value 20:16:29 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000000200000000, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) fchdir(r0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000200)='./file1/file0\x00', 0x40) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0xffffffffff, 0x0) [ 994.822901] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 994.931143] overlayfs: './file0' not a directory [ 994.982158] overlayfs: './file0' not a directory [ 995.045257] overlayfs: './file0' not a directory 20:16:30 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000fffffffffeffffff00"}, 0x1c) 20:16:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x5000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:30 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726466723d2e2f66696c65300e6c6f776572ba4f78d12e2f66ff397bdb9caa74feb09d15a4149c69497f312c77"]) r0 = creat(&(0x7f0000000300)='./file1/file0\x00', 0x80000000000010) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'erspan0\x00', 0x4}, 0x18) accept4(r0, &(0x7f00000001c0)=@x25, &(0x7f0000000100)=0x80, 0x80000) prctl$PR_GET_SECUREBITS(0x1b) 20:16:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x428e00, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r1, 0x40bc5311, &(0x7f00000003c0)={0x9, 0x1, 'client1\x00', 0x3, "7ac2b06e92041c11", "ed12affa2fefcf104abe226205b8eb5fd581c31a141b81bca8e4f51aa41fb7e7", 0x800, 0x4}) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfeffffff) 20:16:30 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 995.599133] overlayfs: unrecognized mount option "upperdfr=./file0lowerOx./f9{ۜtiI1" or missing value 20:16:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x6000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 995.670119] overlayfs: './file0' not a directory [ 995.679926] overlayfs: './file0' not a directory [ 995.691770] overlayfs: unrecognized mount option "upperdfr=./file0lowerOx./f9{ۜtiI1" or missing value 20:16:30 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r1 = dup3(r0, r0, 0x80000) sendmsg(r1, &(0x7f0000000500)={&(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @loopback}, 0x3, 0x2, 0x2, 0x3}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000c80)="a74fe85c0820f21beb1d2fd9cfb183237eb5aedbe541dc142b0211ec2f27538e3316402aa6682db032a8866cb1a8fe8949f9bbb31acad32c6e9fae96e1400d5b737e213fa7544bdc04dd59609343865ebb7f59dd4af4152353960beb4d67f351552687e5f3ca383f0ec76e61f636d66a716507bc59d556f8b0ce58697231ddee4f1e88a1147ce895a0749b9c0d6589911cb75ec4e156bda7a4069db022ca888234aa02210c3cf6e6e41b9283c47bb55b5abf91e0427c358c9b929066408b017f3cbdfd11032296b49be126297eca848acc06673cec03fb5a775e0f9c6f6819946b8d39e968fed8e9d59eee8e194584499c3cec45198bb1dd5a7056d0d30137f22095b66cd61139c3ea77208b51a9298188a581345db0a4a7b676de6f6d541ac7d083dfdd8b8dee8afd4dd1b4f079b87156ad14684103598c54c979c35a09d53a4fd141ac0ee3a10da5f0166d19b6b04f41a552d8e074eb35a38309e9e6a706cee981cec974e999ad669f9d0908aa537476585ea1b397fc6613a220f18f17e5597ac005afdc95366ba1b025c87286b245bdbc11bfbf78d800b51dbd1a9869b099384225dc1ad50550c383614a4409fbdb9d82c2c55a6c17929058194320d91fc9f7d9510196004898aaecb4317aac691a45ec913fa91fe6b9404d8d10d51c91ef4bd538cf67ef59d5f88d719494dacbfaaf23534ea820e6b0c9e46ad990b9fc00009b9d17e3a124da42a90552f00ebc5049f91c70de09f1113f6a4cf0eb24347f88044f14ecf8058dbf2c3972cd6a94ac9e696b20471a75dd24ab46f5770750687f109250c9c2c90377e2e68e0646ed6f6a681d0e66f85db4606e306e0629c8589e29025bf9d38fd753d25dd99a69ca8484985cb30a51fec5af788bcc315c39868ab683050ae0472f0f990ed19a8ea02e5236731f7ab0c2a50a5046070980e225c3dffbb8130b55dcde0f7e515e1fc76b19921f70d12ff859e7ce6eaeb1375a50012568b58f92ac265affb91079f643912fff95aad6ecf8f96602562762589ab938cd8ea5bc91b5862edbe99a765eadada7aa991a262497fddc953d945e1c5c00a4b2445f8b9e06cacc5b672e54451557bf927cdf94182ebf6cd31046def18ef90e460a1f9275bd8cf26694cbbb6faf0185ef403c17e8527debcfc8a9dbe7fe0039d753d31e20044b7b133a603bfb50eda56b55abdc7b9f2473cdb3ba8f3e380d0421d5f3209fbc472c81fa811830aa51fd205e5f0c9d7a454d3142cb2eb4319a086375e841f9dbfc12812d7b46e9cd8f339e1fc408636d9cf8885d68da70c8f0ff93e281021cbe679521be60bdbacf24cb16b8db2dff40f860e8f864f865eeb1ede75c945a6bdd5ff984d8775904abd0a960c61b4c8bf9bfc87af149275f50be5134af723f0c579aaa8ccbc9ae149d58754a8c4d1e95926ba3ecf6820326f8e6efcd87b4ef2b755a803de0829d59f8fa8366779fcba2309622e69e8707740e0c30109312dfddb0d8ac21048af2470bd3e69f86b43f792efdda7f776ae74c5ffbd6bebfa72b70bd4a0a5d635c83a7e1ad238c26fbf304d0cd2fe6ecca1a37fc51884383384d0056e2ce7920a4c84c8e82072092b4fc12b1fcb27971e6a64daf33554d344a57112a3a7287a41035c361d0047483bc03b6d600a75976a48396524c9fc5efe887d267e47fde1764aec8df33591da2487a5fd01ed6c590c48986126d4dce71b1afbcd693cbbec193cec2ea72494a9b66e558308dd7855109d3938b36872c65d1fc94bb0859d64b8bd7c88da2f4c4532a2202b262eaf093d449913a61377103a0587371717a213d55a1cb9212780f3d59e4e7855c29efec91b9f8aafa20eb1c073277c98a95dcf6187e4b053d0bc6ba69fed8d617db024867e38d0144a074454345f4ff5cd8c319edc995fa07a570d8e6ccc36e99df48f1c179dfa8866067ebb199facf9d29961441102f8fbbe3042217517cbfc3b5dec0fe9557459cc812402529b99fa36247442d56554e342396894b32a98f16093b307ff733c39aa75847a2dc07025213e1bab2a0d383f8b8f571cb6427f7dab23398a6a2e7d6e4552e10c3e836a7fda0d047a9f533d70f8dac2e7e4e290224c50d89ef48005df2d5bf32dc60c154430e040197f2a023bed5a6f16e356931b391b73f26fca0b98d36d7465646e1694784a850508e18b50677ef4d30a0996cd259738635ba8f7c80fad4a397c4c1477ee00267469665c9545be70769932b37910586261e77cf0a5771ba38fa76567280a3a7ccf67c80e5768f2dc163d8d860a348cf451d14c17bead42d24c712411defd7bfca8f1b72da2becd807b754ca90f284c71e1cb61f3cbfcc771702f402546ce4ba69b346a12a2c3c4fc67f9e57b77923d9b12c79b55025f3e33db5bcf0f499746c98b327d9e1e626ce533ba7add4313800acd4ea9c240c3b3c2ebfccba09c554d2d761f33169dd05e7e20dd599325a7612b6eef6a4662d5cc2f78590796475ab691dbeb2a9d06266597c359337c2fb9d85a9842d45edc383c48f78409c4db192a81bedeedcd313abd81fc0b516ff3f0d156ddad7a18603d5e9a0fced772d37911a0755f8a402c6ca953b88eff54e1f03310b3ad9229b5080c0b803fd4e3490685112fde70572ff1bc5e45bfc28b95c71367b1587b7e11de892ce1ad74949dbc58524e7e8a6d4f3f9118609af979d47dfc3518488c66cfa1609df392e1d5526cf7be09d67bc5d478587e115dbcb19306f2c214c4047e6caa081920b749eb48f3d3dc67ac174bdf695cbc909782b8ad4e2662e1193cf5f414e127fed36764bfdc74d42bd04795808115e54803b8c7ebfa314d16cb839cd32ef450c0bc7743d95a1bb3f0c4344d989c3e50e2a2f1f8f6db0dce915f1764378baaefb583c958ad5dd57374a57b13da6b9f590f3a03876ffe42b4fbed5c5c12841bc9c07f75d14a01055be620daeb014af0367ef26f09bf2441a0a4f555697d785fc729b4a43395c2404c9fedbfde070f6712fed6d2f02c647a7770e9da192a8d6611b2a3c66703e05c2870a2e3dbe590d35c36eb4441ca24f4bbbde776427cec89ca94bcaf7157e494609e8e9511ac7e11e72726466ae5aacf599586c7213cf02be81576c4e4cbcd73b239dcd26be75f862e56ae4d542fc5f825ada3c3d5e9123ba93db4b961a6194acf54a846dfa4c1a55c9d4b8c669cfc5e569f8dc4038247f2861498290f862790cc7170ee3650981b5c5ab637eed606e53e7b9c2946acc6c019bcb1a24b904da488f10eed35c6a460eeaa30611c7c2d68a2c21e67cbe78e2e7b45cada9fdcbd2bb8d42ef3ea2c60f24c971a12ab78ab2c643b50674dc0cd6a789f7688a65475b62d9bdf925b8fe31023206d30c3fd6e2cd88f643c9c0643585ea7089bbe0956f639566eb70b43e81f522d1413ca67e53729c5eabb5409343ae31b0e6e17caebd56a0b483792bf16403259840181619b05481e30a85a19a88992270c099f616acbff2815dde712f94e7197e8026aabef35351aa55af44a608c67dbcb42db00782836a4381103158a2aac34372e8ddfa24e6307e10f1681055f98ef8f10eed384aa583d1b53a88beac603d3c159bc0678f9b59085ff4ad058b14c13a49170e2a9e35cea92d7f8a0098360b13f6a4f89b6a095a23df4d15ab7cc6fc2019510e8e0f1847319a3f85cfd63768efe82b69a0dfa328457bbd71920c1c3090e6debf5945f1d387fadffd9ff2e5d1b917f8f815234477cb333c9d73ac2d5a6e9c5de11d2e1917e0a8806f7959c5798aa800bbc4c0be216a2cac99f6fa1dfd192f55dcb6d312d4aa0d5cc9f097ab9d57a181d3c1c8c8a6f50b1a51b1eed79f6fdc79753a1d79535ce0ebf6980cb7868fa0c35f3ebe24ce9023f0864791b01255e4f064b0817b5e7fe7130851dbcb353101d1d0ff533e62e1a8a8dff9f54cf58e3a886726402ecf1acf2ab8492fc86cf35ea0699a2de4fdef43c8098b7c2db8aa8a625897a2b239262e1d6aa667707ea50f8b146dadf80f0ae68c10aeba2b1156a911058d476053de91d99a2f00469ab5e78321d47479112471d36405f73881ea7fe18ee3ada7ba3628e0c7f348d2c8930fd43f2dac2daa961b64ac6aa08db0ecddd0fcd35eb355669e90a7e48297d061806320b8a75b3afe5d66f952610e212734a5cb8d804d0111a9ce72a91ac38f9e43e6e08e7d17c7db1ee968a09721a306e106c92f23a2859f1bc41882b320dd737c1c505808a6709725a14f2b1ef727104a8058cfa1538ab901d82e083cb38154918a6fb8221dd90a3428a74b000c7c1b127d7f8e55f3f3e55ad39a44fd1be435a751a1177bc112daa071c541e351382d8d55b7155920665bceb4f89e7395ab39d035204cebf45d8ed573c4726ce42d33d3bf9396f0173c911b17e4b3597e6f843f870b2a7378de64cff9eaef298f3f8bc3d4bc6b7af74ac65ffa9110663574968640481d7f07af1a2ad6e65207090c11ab1dffdd637ad6d815a66444a0aba1a690d66b66dcb8d634b3b33b24aa7eb8eab38ff230d1ef8cd53de235d08ac9fe0a539e46ab30a8937dcf1a617fc64a54757c0240267f509ec1ba1c895b8569dabafed91cec749b6eb9dcb837c5af0e8f7ad05d397e711f861818951ba9f09782d0100545188ec3bdb6659ace28253acdb0aa6d4043caf7c8e766fe183ef79e641e9de63e4856fbe9fe00ab85881b9c8ac1af1d8bbf90cf1ef3c5960ad2f96ae0d8f0ec93753927b0894b55fb894e85ea902935e5a1c7497345a2dec4a03ea2162e04a3bfe6d452f9e43afb11daff4e0caa0da6ae4c594392ae8e884219b795839d2c2c6eea4f77e78d8f68850d3d1fdffff8ded8ebd0b82edd37947c4ec386af1b9dbf8aadd67285bd6426551f70b2014ab89664b3c63097670d4ee33c6b45339f6dd46367a9e213fea8a1e82d080bb47debe181f352ebdfbc5e960da9518ede634abb30ed532ae6ba26668729e83555b88bfbad7ba0c9010c49839cba5c7f6f0fddf016e0daac1ee47f11e87cb712beb675dc93c6668fd56685d844e9ebb5d810978bfcbd5a92d2e6d0ce9fb05f9aa44525661661eadc9b04c2182e38a9f90f06ddff7593650066449515c228c9217a2b5948bc35c8c4e0b261795d383ccfda7c1a99ed08bfa153a86d492ac5acbbbd28ab843215dac83853b8d43f0ef5e484b4fbaebd2a0e6c1d331f54c9266af0c310f2e342c80ab5d3b5418707f9a3e958b035192bc3df2e470351fc07e932f0b982db31557ac51203a1d449daae9ddf3640d2c3c1d82ca5946661f83d0ccbaad1f774293fdd5ff3a873f839b14e627da13abe33ff00fb0106099344e915b25d9f8980499993672a02fc608aab27d589dce68ff662893376fdb5c084a74738156a229ecf20e7cf66815bc7b5e17246b51c1154bb87c46efa0da481e6570a34402a5513d7b17b0ef9538d03592924193a55a31f42538afc599577bdfadedd473873e064177ee6b3ec197ed9b0beb3c04bf18b319f614af8857b464c30a28372098084ea5bdcb7ff8789baa78688216310d95a0feacc8811c4c638ff3d5d5bab80a633d1876e4ef92c60e2c92a26c3904bc9b3fd86587cefbb3f1e0b3d10557f8d7982e51bbaf30d5373e9e2159c468b491ebe269a172acdbef63d9ce623dafcaa8a43e780101b1bbf5323efa411f5a24e48fd24e3138f55468138db7e47ef6d427c9a19961fcfb929df3d9e1092ad9b62793d480bf66f06ede76722b6a91bd9d7d4947cf3aa29bacbde0b03a4c0138c6cb5d7f60136cac9e3652afdafe2ea", 0x1000}, {&(0x7f0000000100)="08f3d6afdab04db76b3b8f8fa99812a3751044c405a6f5b37af48a83125a6ef3e09eccbdf354fe65defa5ab43b5db64851d07b", 0x33}, {&(0x7f0000000380)="d1d19890c12d76c57e026667c465c8d9cdec011f90198e384a1a170fe619364ad16e5a894637e8bc0756fec1264bb764acc989512d750655bb878433461bd34f5f70f5f88b52f0e40b7622fcb9bb2040d06da19868754d25590a941bd3237a9461fce1330cdb49014972ca4358aff1f20511ae12dcf418be815e86f2a5aa1e8838f27377b8ca7ce5655e3be066ab1e4528fcc3", 0x93}, {&(0x7f0000000200)="ead9c6f2b1b3445afffd002d3039a6fac59d55e4546e9e85bb810a8ebcb0fd6447fb1018a6583eccd6ce4e313f0340b18cbd5d63290136df95be72575e64aefe45671e35f23bf2d6aadbb6574ab024a44207389b24beaad82c30a9f114049fb1589c375482d60056f16a52b32663a2a2ed50c7d9e721f1", 0x77}, {&(0x7f0000000440)="152c984e7233742ce2905622ef88d4c3e7726ee7769a4dce639f2eefc16227309e5f72b4b26b502311aa764015b04810f92386842f0bbc3fc99bec9bb12dcec068de4aa5b63e123cd596a8c15e03b4a6bc17bad13bebe757a5def4eff78b23021e1ba468bb2e3e59dba381b40fe1c1b5b93e11eb6f389f9965b42f0d60f3a34ae81bbb9d9e7b5ac7ae195cc139e29bda84470700d038f6785348d8cc6e38675271ea0f46d6ec850ebc140bef86c9537a78482ba2d4d761f28553ff276859e7", 0xbf}], 0x5}, 0x1) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:30 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffff6) 20:16:30 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sequencer\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000440)='fou\x00') sendmsg$FOU_CMD_GET(r1, &(0x7f0000000500)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10000090}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x34, r2, 0x500, 0x70bd27, 0x25dfdbfd, {}, [@FOU_ATTR_TYPE={0x8, 0x4, 0x3}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x89}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r1, 0x111, 0x2, 0x0, 0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x7000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 995.899802] overlayfs: './file0' not a directory [ 995.995346] overlayfs: './file0' not a directory [ 996.020589] overlayfs: './file0' not a directory 20:16:31 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000000000000ffffffff00"}, 0x1c) 20:16:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:31 executing program 4: mkdir(&(0x7f0000000600)='./file1\x00', 0x10) r0 = syz_open_dev$radio(&(0x7f00000001c0)='/dev/radio#\x00', 0x1, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000640)) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000140), &(0x7f00000005c0)=0x4) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000540)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)={0x134, r1, 0x21, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x652}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3d000000000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK={0x60, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x37}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}]}, @TIPC_NLA_NODE={0x3c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3f}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40044}, 0x4000000) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000a00)='./file1\x00', &(0x7f0000000980)='overlay\x00', 0xffffffffffffffff, &(0x7f00000001c0)=ANY=[]) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)=0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000ac0)={0x5, {{0x2, 0x4e20, @local}}}, 0x88) perf_event_open(&(0x7f0000000a40)={0x3, 0x70, 0x5, 0x7fffffff, 0x7, 0x3ee, 0x0, 0x3ff, 0x8000, 0x1, 0x80000000, 0x101, 0x100, 0x599c, 0x10000, 0x2, 0x7, 0x63, 0x9, 0x8, 0x1, 0x1, 0x2, 0xf5, 0x4, 0x10000, 0x0, 0x7fffffff, 0xfffffffffffffffa, 0x0, 0x0, 0x3b1, 0x0, 0x3f, 0x7, 0x6, 0x20, 0x4, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x9}, 0x200, 0x7, 0x1, 0x8, 0x2, 0x8, 0x3}, r2, 0x8, r0, 0x8) ioctl$PPPIOCCONNECT(r0, 0x4004743a, &(0x7f0000000680)=0x2) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f0000000580)=0x8) r3 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0x74, 0x74c9, 0xfffffffffffffffe, 0x0, 0x0, 0xffffffff, 0x41000, 0x8, 0x9, 0xa1, 0x7, 0x6, 0x80, 0xdf, 0x0, 0x9, 0x8, 0x101, 0x2, 0x401, 0x8, 0x0, 0x14e00, 0x99, 0x100, 0x4, 0x200, 0x6, 0x80000000, 0x9, 0x0, 0x91, 0x25, 0x7, 0x2, 0x8001, 0x0, 0x200000000000000, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x8000, 0x20, 0x0, 0xe, 0x8, 0x0, 0xee}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x2) ioctl$EXT4_IOC_MIGRATE(r3, 0x6609) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000900)={0x1, 0x2f47b8749e831ef, 0x100000000, 0x1a, &(0x7f0000000840)=[{}, {}, {}]}) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) recvfrom$unix(r3, &(0x7f00000006c0)=""/227, 0xe3, 0x40000000, &(0x7f00000007c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e) ioctl$sock_ifreq(r3, 0x893b, &(0x7f00000000c0)={'eql\x00', @ifru_data=&(0x7f0000000000)="c21d52e0890c085b6389de5a7d35a529a3d8aa3c2f8acdadb827db753fce92a6"}) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000200)=0x7f, 0x4) 20:16:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfffffffe) 20:16:31 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x8000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x9, 0x800) mkdirat(r1, &(0x7f0000000c80)='./file1\x00', 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="757070655c6469723dd5d58972362def1149c0b2b16561472e2f66696c65d99c6ce7a6302c6c81da26ec93fcf2a651876d55c5776572"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getresuid(&(0x7f0000000ac0)=0x0, &(0x7f0000000b00), &(0x7f0000000b40)) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f00000002c0)='./file1\x00', 0x8, 0x9, &(0x7f00000009c0)=[{&(0x7f00000003c0)="df76c6e7be043e8aaa9db5a88b9ec2a00d89240e36b38d4512a46517cb9d1fd5da8ceb83393babb583842199b0a31aa7da851886301ca980947811a6878df74d73900af75af9941a055b4a2d9ab8242f72d7aaf46a68a61053e6", 0x5a, 0xf9}, {&(0x7f0000000440)="a1adfd05b6431f281855043aef0b263b14d9d1ab3faa35fa86681afb9bd4a5bb1a42d0f1b34ced18b18b1e4fd4973baf3b9e29a2ad351b35c4584ac7cc6229a096fdc135f42c28b84f9a2e9d52a7420b25636631889071769fa560251c56bd0bcdab278ab102e9329a543c2a7fc2ae571a5dabd19ebe43646d28ff554dcd45b11ef25dbc73381c054d4f886f22a456553203d1162ac330bf6e5c198ffe94b9cc9f42b1285accb5f92bf868a19ee78359618736a4289e0644073339d2d6a199fa4739e82a1ff9cccbc99b8c5885b7a98034c2602768aa1b2eb856ec6998bfc4e46603d9", 0xe3, 0xffffffff}, {&(0x7f0000000540)="76a3777a5e9084b88efef29ea5a5cdce8c94b519f8271953b73e6a6e482780b06f95ccf9b433b95aa19fb1eaccdcd33a416231a0fdc54863af5bbb34074b552cab9604948a2b8d8f141651a60411619f12efac5731f8470e97c8d93aecab59dca94d6e1e19284235c6b95d3f41c3ebb3a1841efc4568b696c1308a1c3b79f7381df0d88f6e12d989275e2040fd4ecc2cb33fb4088c06f1f9359ac8f74f50694d9feb3441ae0e7460fda1f85bd6cd9c69f1c7bde31077d117333ca5eac71839991ce5ebf26d17cfaf23003c24bc387e308cc7e23d506194b1fcc1385be0508d853fed4d2baea23a1d38ceaaed6b6b063f34157840856e51", 0xf7}, {&(0x7f0000000640)="c16ffa846e79a60b821d1c15183dc8fa3c22d6ec6a5e3862ce0e622bb49a2a43676ddb15b9c450acb45f665ca3823ae647568bfc815032f0df6fde26c04a9a6ff67b15c67ab7d11a6fc8f8286c62bc9442a39f3ba0fcef83c0a7946f607f41bc359112ea99a0c2999e58617e2a3e6f69d3c3c90d310fcb162df879e5e1759546fddbbec8bf33d51613f641f72a10845575930dc2acf2d23e048cd51476d2cc1c9da0c4eeeff0a7b6a89e2e51d08c4f9a1735afc88cca3f7043698d265947f6046bee1134d3e24777a85aa7a4b34490273d55efd9f0b89d95a181b10d32d778f963fdf33b1ffd9bfb3232704026a684e0a6da53849e6c1e", 0xf7, 0x4}, {&(0x7f0000000740)="3cf4db28e38b6aaa4357847c76e45c7fd3ad86bf04b4500ebb5834dce9d10e4335309cda0a5a46cce66f06f7ad6970bcce63163e0f740f01fe39d6d35832276d1ec63fcc0e347cb61292174719fa5479a087d98f3adaaae0bbaa63df6c7fe18f77848cb94717b5fe8c733c4ea6860e06240e8bc225c70392c7dced5596cbed7366f01a43599506e5438471ce972ad0ad5169803e3def68bdf81d7ac352fc2b315bda8220291257361e60cd18a327ba7ae32dbbb08f704620e8eec44067078bbd38a976c1831ee6a5f281a60a22ea669a0ae2b70d722f30184afe0d6a8a32c0efbe88605a46c8695fcb761ec8dfd24e30254526163ca744", 0xf7, 0x1}, {&(0x7f0000000300), 0x0, 0x20000000000000}, {&(0x7f0000000840)="926d5d4e4db0abc5d95dccf0a16f7b21156eb7b81bcf24970d46a3a5efa6be258b0758dd26f5cb7cb46129a2ed97962d7a2103b9e5c4510c5be9552b5da0bea438560fa2022093d9240574e1867402246346cce52971e77061f6d413a95351ec3ec77ff484bcaa89b3a763a6b176ee615b829e7a5a21384a8b7b66", 0x7b, 0x9}, {&(0x7f00000008c0)="53b23a4d275aad47a63fdae539d522f350f558746b1d48e49605b8a73ad867e572ebbf5fe7c69e7d225cc90e46bade07628703a6fb3719becd9a29", 0x3b, 0x3}, {&(0x7f0000000900)="9146fb270b6d3fceb42eb1bb207a1ff0045ffce008bd76d53262052f5df44e61b4424545341b6d1df2bb3c9ecf03f4dc56a41a4cc3e5ea052b98eb62ab2c23b99ec686100e23dd0e525105bdbffcfa83a795a7af30c76e01c383b6f2ca6f165c6c60604bd462367d96a84453c60cb9650ffd6ec5dfb15464c1ea339260ad9243df8c4831b2363cdac9c9becb03e6ab6377fa5d87b44ce9004c31b85aa8dfbcb142a84495f721fa8864b70fa9211bb15103c8f2da268eb1bded7e5c5d6853", 0xbe, 0x8001}], 0x1, &(0x7f0000000b80)={[{@shortname_mixed='shortname=mixed'}, {@numtail='nonumtail=0'}, {@rodir='rodir'}, {@utf8no='utf8=0'}, {@numtail='nonumtail=0'}, {@shortname_mixed='shortname=mixed'}, {@shortname_mixed='shortname=mixed'}, {@uni_xlateno='uni_xlate=0'}], [{@uid_gt={'uid>', r2}}, {@smackfshat={'smackfshat', 0x3d, 'overlay\x00'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 996.549706] overlayfs: unrecognized mount option "uppe\dir=Չr6-IeaG./fileٜl0" or missing value [ 996.577583] FAT-fs (loop5): Unrecognized mount option "uid>00000000000000000000" or missing value [ 996.591891] overlayfs: './file0' not a directory 20:16:31 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xa000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:31 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x1000000000000) 20:16:31 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@ipv4={[], [], @dev}, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000480)={{{@in6=@ipv4={[], [], @remote}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000580)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) getresgid(&(0x7f00000002c0)=0x0, &(0x7f0000000300), &(0x7f0000000680)) lstat(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='system.posix_acl_default\x00', &(0x7f0000000780)={{}, {0x1, 0x3}, [{0x2, 0x4, r0}, {0x2, 0x4, r1}, {0x2, 0x4, r2}], {0x4, 0x2}, [{0x8, 0x3, r3}, {0x8, 0x1, r4}], {0x10, 0x3}, {0x20, 0x4}}, 0x4c, 0x2) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:31 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') socket$caif_seqpacket(0x25, 0x5, 0x3) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000200)={0x2f}) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) clock_gettime(0x8, &(0x7f0000000140)) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:31 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 996.879502] overlayfs: './file0' not a directory [ 996.919728] overlayfs: './file0' not a directory [ 996.927226] overlayfs: './file0' not a directory 20:16:32 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000fffffffeffffffff00"}, 0x1c) 20:16:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xe000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:32 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$security_selinux(&(0x7f0000000640)='./file2\x00', &(0x7f0000000100)='security.selinux\x00', &(0x7f0000000600)='system_u:object_r:sshd_key_t:s0\x00', 0xc2ee, 0x4) syz_mount_image$nfs(&(0x7f0000000200)='nfs\x00', &(0x7f0000000240)='./file2\x00', 0x364e, 0x6, &(0x7f0000000500)=[{&(0x7f00000002c0)="55e00d9a8113d8263096ec2684bafdd35632aca68212", 0x16, 0xdf}, {&(0x7f0000000380)="676371fca592842c67b373e75c6bc2416e08e782ce99eead5ac5e3f5452c99c793bd3522f0c496ead9b05f88afa4b85fff73bdd744025df393f7af48073b65fa094c1f82d53848489b866b3fcaf191ee1c86ae3790d4380bf900f52874a713b6e7215fcf526a9c9bf6e0e7fc3c388fabc605339891d0931f3f611a47b9220fca75ed09938c83ed34536ee53dd7a2554b7f4e0b1211bdb02d011d1a2bd8e3006297df5f3db4f134aa9dbe39cda1d5a061b74ffb80e439c2ce5a", 0xb9, 0x5}, {&(0x7f0000000440)="c886c8052bdd756f05b0153a7328aafd966614ebc13b3429d14b295ac4f312b1cebb64b39dabe77c66c097d353bde1cd15a141337c04aafaba06db43ad63f8263638072fdef920630d6c8c2b4e1a9b827311fab363d9af0131ca38e2b5ec7ca9c1cb47776302e432def016a24748", 0x6e, 0x7}, {&(0x7f0000000300)="16588a0f6263c9a04adf", 0xa, 0x80000001}, {&(0x7f0000000c80)="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", 0x1000, 0x4}, {&(0x7f00000004c0)="908da582c66e2fc1817cb6b60318a2ee6967713ef31c69efe1c2bbc659c38bd31594d4445e810793f90ea4", 0x2b, 0xfffffffffffffff7}], 0x20, &(0x7f00000005c0)='security.selinux\x00') 20:16:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x100000000000000) 20:16:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469063d2e2f66696c65302c6c6f7765726b6469723d2e2f66696c6531000000000000000000000000000000"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 997.424582] validate_nla: 6 callbacks suppressed [ 997.424592] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 997.459336] overlayfs: unrecognized mount option "upperdi=./file0" or missing value 20:16:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xf000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:32 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 997.517109] overlayfs: unrecognized mount option "upperdi=./file0" or missing value [ 997.555687] overlayfs: './file0' not a directory 20:16:32 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x200000000000000) [ 997.624366] overlayfs: './file0' not a directory 20:16:32 executing program 4: mkdir(&(0x7f0000000080)='./file1/file0/file0\x00', 0xfffffffffffffffd) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000048000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 997.673106] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 997.691824] overlayfs: unrecognized mount option "lowerir=./file1" or missing value [ 997.746434] overlayfs: unrecognized mount option "lowerir=./file1" or missing value [ 997.837376] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 997.860120] overlayfs: './file0' not a directory [ 997.866550] overlayfs: failed to resolve './file1': -2 [ 997.877555] overlayfs: failed to resolve './file1': -2 20:16:33 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000200"}, 0x1c) 20:16:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x10000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="7570700f020000723d2e2f66696c65742c6c6f7766696c6531776f726b6470723d2e2f66696c657100"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') syz_mount_image$nfs(&(0x7f0000000200)='nfs\x00', &(0x7f00000002c0)='./file1\x00', 0x81, 0xa, &(0x7f0000000880)=[{&(0x7f00000003c0)="a1acbc3cd6ae77d88a13b7ff77af002af73d95a6080ace54568529b2c321f2fb5520fa8f183ed25f5933e88da1bb0f6f942a7de46abd2ccff949f84cb30e78c8c2081c0c05ab74ad3d9de9b10f8fbbe3b7a4ce6faac29308a107d50e9f6b530508214caa25714182099dc69f5b2aa7b3630182ba2244e523a847de126d00380b2ca94f96ae", 0x85, 0x7ff}, {&(0x7f0000000480)="239343bf656c4230ce8be698d6fb1a9594cf9aecaa811991016592593d074f15a5d4044d32e4dd8ebbd2effe5383000e26ba1d3ddfbc0439e0b114b412175c927375a4a76ade07d4b595245890b3f28a89160c8411aeeba1146dd680c190beb1397188a98e886a9104f435dddd0ea80d08195e3ccf6a92dfffc63a97e4534e7fd3aba6bc5d0d3f9fa152fe18c575ecf50c5e924a6d9d911ef96ab52010039aa4ac7e11a5b48068bfaac0f8d389c34a32b3db5cff37c72d3cd2", 0xb9, 0xcc}, {&(0x7f0000000540)="04095a0dd95482e001956322c3d82b75dae452b705b58c9ccb7ceb6aad5c4438ace5ff3c562a1d2dc457649c75f59cdde15313cb7bd4f54b85f04244515d5b5bb54df09b23942a8267a84a99c1c593c0ff2b66810313b817935a0e31", 0x5c, 0x6}, {&(0x7f00000005c0)="d5c6749031ec62ff39fc47582d37ce6c16ce1f2d453a2d39f1b5dcdddbba523728da6059c95d445d11fe52062fe63394f69247f768801a468d5c5f784a9ed4ffdc2941244acdce7d8430d5f68aaae9de879c8d503ad9b71a687d7060d6e2bed4a8ebf81f51a2d55ece82705c6e5d1fb434540fe4478e4d4964cb70a1e3defe57", 0x80, 0xfff}, {&(0x7f0000000640)="7e40286f6136984b27d5403bb4062f651309e80fee154f6d825e7e480892bb312cffd21208c14531bc502c0df3b895dad2c40222b26f8b5ac2d309e322f42faf8c9f589958a674177b298a7761ace50657846431075e377d89a7a4ee957d3df552c9261e64d159f64697426720505959297ca94b64ce9a1143971c591e6869ae9d9a6b1e904231a54607f699cfb3025b64a3fabc2eba888e5ab443d68d183fa6f2ede8098409e8e5b33c00adce7690facb22e54aee4c9fd72761d3dd0157166022f02f12374855186e2aa6b6a40ad5cc99d6a9fbd8dccebb15585f40392d3a1a77a42a7d14c27bd9e1ccaa3405b5ecbb61f5e60016c8febb", 0xf8}, {&(0x7f0000000300)=';', 0x1, 0x6b}, {&(0x7f0000000740)="7e3c18c4affcd4a9b7b2b118f0bf02dd2bc976189215d8721b23464cbd80e24d8225b9e0", 0x24}, {&(0x7f0000000780)="ce65ce85d05da22a25b92d81cfde23956d1f0d1d79bb3dbf0432f8c953381e6a3e0c27ddd726ea834bea6f2f380b5fc1313f2664b95bc66bbffde63a42c3252b28bede334ac97843fd83731d3254f1842fb7869fc6d033e8d60ad3160be1d21803907f87d06435baf1334f77500181dc0f4286036350ffc9", 0x78, 0x1}, {&(0x7f0000000800)="75a40b7addbf6755191051bf5ee2e57554cea3ebdf79663710885cc6385f2599b81e1c8dff5c9319a444d213f204e0c944f39cdb439e9a6d721feff7547fe4d04ceb55393b95077863c6eb0d6824cd34aabe91030071", 0x56, 0x81}, {&(0x7f0000000c80)="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", 0x1000, 0x604}], 0x4000, &(0x7f0000000980)='md5sum-+\x00') getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000009c0)={'icmp\x00'}, &(0x7f0000000a00)=0x1e) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@v1={0x2, "84b6f5e87aa684c3e224f397a66c"}, 0xf, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x400000000000000) 20:16:33 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=.\x00\x00\x00\x00\x00\x00\x00\aowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000080)='./file1/file0\x00', 0x0) shmget$private(0x0, 0x2000, 0x54000080, &(0x7f0000ffc000/0x2000)=nil) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000380)="8a867cc3e4623bc4bcced527e3d9e1b084b9b5f60987cbbf75e105d7bebe1077ce7f38e12a28ed90532fb8458a030a1429e31cc509e6f12120414517093a496bcb89453b228b0e8e3bd128fd0600692c8570a940075827e1d8c5c67152dd8e15b2bd9dc1bfdded5d4b2c6389af953890292739c36ecd472f3ec84f6c30bd0b8f052d75b876c86ffc745575f7308080f36fe2c464aaedf8950ef9bce5467e9c803cc156b424e3d1ad095ecee29b23e8dbceb4169ad1f0b65d007f46da60f8b114e533bc81197e3459f570d857cb6ec1c2859cce1727bc941aad5a0309001173ff7bcccd81b1a958436d634065a9", &(0x7f0000000200)}, 0x18) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) ptrace$setregs(0xf, r1, 0x10000, &(0x7f0000000480)="7433e3a0ec8bada8534617d01f5f44c099f30a1e44f0895086db117723a0a40c9b1dc7372f22fbb2bd81c9c23b9315b4ff1049bbe216bb9c02bcf4c41343a8e68d9842b28b7a210166fd4d3430f1461e4acddebfacbd9bc36b7b3f048f696bae903d78031ccf4079d439ed3b600823d55489ff691fd0d17809d1329826ba3bcc0b9dd2168e8eccbc53b39d2a1ce7a180312d85f3b985174062cf67e29e5413193fbe7a39eaf57bee4750a7a31e0308f94d2becbc902cf40287c87383efe2989dfc4fa742c3") ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f00000001c0)={0x1ff, 0x2, 0x4, 0x8001, 0x8, 0x26, 0x14, "32d0a765794457d32eeb65fd1da57fd758e88ac5", "6d77a829a3418c8c3fb69afa7dfcf48a5e402a60"}) [ 998.399390] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 998.411734] overlayfs: unrecognized mount option "upp" or missing value [ 998.417388] overlayfs: missing 'lowerdir' 20:16:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x18000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:33 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x200000000000000, &(0x7f0000000080)=ANY=[]) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x81) accept4(r0, &(0x7f0000000080)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @loopback}}, &(0x7f00000001c0)=0x80, 0x80800) readlink(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000380)=""/4096, 0x1000) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff) [ 998.477945] overlayfs: missing 'lowerdir' [ 998.484904] overlayfs: './file0' not a directory [ 998.529399] overlayfs: unrecognized mount option "upp" or missing value 20:16:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x500000000000000) [ 998.571878] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:33 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000005c0)=0xe8) r2 = getuid() getresuid(&(0x7f0000000600)=0x0, &(0x7f0000000640)=0x0, &(0x7f0000000680)) syz_mount_image$msdos(&(0x7f0000000200)='msdos\x00', &(0x7f00000002c0)='./file2\x00', 0x6, 0x1, &(0x7f0000000300)=[{&(0x7f00000003c0)="bb52d9818de70685bda61453da981aa7588a82e01f147fe28d15d329e2d0cc8207a0cc39c09e415f79b392bf96e1e5c6e6dbbccac1f0c5fe79b2ff1f25fdd6ba47d1c764fa0b8d5894ce22c0e3a2e43279604c92163efa1390135d846fb06271d3a73bc0e46fbef27c786c73ded87a632c029f7445b349da41ea701f4ea862c86941ec9ce632f01d76b7852e582aac73d1c276f9be6abbf600eb82e62eb2f9a6a0bc2f8257c105085ca4e18cc868d07ba3c7bba74d9f002a4e0640290eae34b42805db2a2e481ed0623d4b340df63de1439807955b24da5aad033ccf4c42d8cf5865f414afa3292009c7ebaa33a0c8c1638d63fab3", 0xf5, 0x1}], 0x2, &(0x7f00000006c0)={[{@nodots='nodots'}, {@fat=@dos1xfloppy='dos1xfloppy'}, {@dots='dots'}, {@dots='dots'}, {@nodots='nodots'}], [{@uid_gt={'uid>', r1}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@fsuuid={'fsuuid', 0x3d, {[0x3a, 0x32, 0x65, 0x31, 0x7b, 0x31, 0x76, 0x62], 0x2d, [0x31, 0x0, 0x39, 0x64], 0x2d, [0x64, 0x7d, 0x36, 0x73], 0x2d, [0x73, 0x73, 0x77, 0x63], 0x2d, [0x62, 0x63, 0x3b, 0x66, 0x77, 0x77, 0x64, 0x77]}}}, {@appraise='appraise'}, {@smackfshat={'smackfshat', 0x3d, 'overlay\x00'}}, {@fowner_eq={'fowner', 0x3d, r3}}]}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) syz_mount_image$hfs(&(0x7f0000000780)='hfs\x00', &(0x7f00000007c0)='./file0\x00', 0x7, 0x7, &(0x7f0000001c80)=[{&(0x7f0000000c80)="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", 0x1000, 0x43}, {&(0x7f0000000800)="7eb71543740a09f15e679d5953253eff87225f906f870d563ab1d514751a2acc1fcab0fa981067c48d61fde7a5665e5512c42a3a69379552eaf5b98df2424e920dd5be1ab243dd1c3f83", 0x4a, 0x7}, {&(0x7f0000000880)="92670de674f07bb7224d4de7fcfa2d3002042f474e38072e86ab90a088acdf38b25537a9c9ce77d7b3efce1f9840b8628c5249eb94564e5dbda1003ceb2fdff6839e88c340c2529d1ade212159f3a10aeb", 0x51, 0x5}, {&(0x7f0000000900)="ca6977bec2893d20ccac8551331791ac3a984ea132e753aef4e7e4ea72bdb9f9e100eedd745f7a5cb39284aa9c78e1f31b0a5e1f100014a3cc94965eab7e25c95f6ca096d352c08f0037dcb041419ef9eb4161cdad4f44932821289e2e3e20a1674602f7cb96765baea90345b3f64aa31fb21e91906de1633794d91b40f9fbf61f", 0x81, 0x9}, {&(0x7f00000009c0)="1506f34f7d248de073", 0x9}, {&(0x7f0000000a00)="f0d7bacf535ce1c2036259c2b9f13354eaaaf35d60160520b80b8ec31674df1da4062a996373fe5e9881a8b17efd3daa30b53f6d7b759f2c8a35d1edd44263402ab3f988bb5ef7a383cfcba89b6699689bef08d9b2abf02ab881a93c74c0395c040a366043911c2d03cb01ee63283b56c4be9e75ded20eb4c1899da98ea15cb82ae34c5c3cf3cf28b2e999588d444a23606e8e81a88c99b31e7151f504c31e37c629a9a81175eb20c0a3315611fb91c9a457f93d029f83853301", 0xba, 0x8}, {&(0x7f0000000ac0)="4d097cac0c1f9cb279eccfcf81604112ad8326242aa8cd3c1376b3ba3c7e0db805aa635541dd449fd4f193edea71dbb4c4a96a7d753c5c8b1f4f5c29a46713bd86abf0459a7fb97c435da779ca0236c1061abf3d554af3914de110d8fd653d5ddb095afaba6a2b5eb892b122a6e3662bfa41dc6e77e9198964a1736178954e11f442a06a621b058be04795180fac9ad67c9eef41485039f116dda167b619dd45b82e8cdc2ab429b4dfd33ba481a7ae4d80c258ad9079192730fb04f39270898ecced24206f729760a1c14ffec64a2686a1bb00", 0xd3, 0x2}], 0x31000, &(0x7f0000000bc0)={[{@dir_umask={'dir_umask', 0x3d, 0x8}}], [{@fowner_gt={'fowner>', r3}}, {@euid_eq={'euid', 0x3d, r4}}]}) socket$inet6_sctp(0xa, 0x5, 0x84) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file2\x00', 0x600, 0x0) 20:16:33 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="75707053ba5aec7d597700000000720000002315f822c909141fbea6440038c587cda67a81094000000000000000000000000000000000000100000000000000"]) creat(&(0x7f0000000100)='./file1/file0\x00', 0x2) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 998.769974] FAT-fs (loop5): Unrecognized mount option "uid>00000000000000000000" or missing value [ 998.822247] overlayfs: './file0' not a directory [ 998.830073] overlayfs: unrecognized mount option "uppSZ}Yw" or missing value [ 998.862817] overlayfs: unrecognized mount option "uppSZ}Yw" or missing value [ 998.898141] overlayfs: './file0' not a directory [ 998.986113] FAT-fs (loop5): Unrecognized mount option "uid>00000000000000000000" or missing value 20:16:34 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000300"}, 0x1c) 20:16:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x18100000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:34 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="7570006572644d723d2e2f01696c65302c6c6f776524cf69723d2e2f66696c65312c776f726b6469f23d2e2f66696c6531"]) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') fcntl$setpipe(r0, 0x407, 0x2) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x2000000000000000) 20:16:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="75707065726469723d6f776572d627b3d9c4a76469723d2e2f66696c65313c776f726b4469723d2e2f66696c6531000000000000000000"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r1, 0xc1205531, &(0x7f00000003c0)={0x7f, 0x2, 0x0, 0x81, [], [], [], 0x5, 0x8001, 0x6, 0x100, "a7672c09c0d785c8a1683075e1a88205"}) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 999.329778] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 999.360888] overlayfs: unrecognized mount option "up" or missing value [ 999.376768] overlayfs: missing 'lowerdir' 20:16:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x20000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d000006c000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 999.417738] overlayfs: unrecognized mount option "up" or missing value [ 999.423406] overlayfs: './file0' not a directory 20:16:34 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="757070657264eae159d2fa71493a65302c6c7765726469723d2eaf66696c65312c776f726b5ba8c68f8bfbef971d388924ea9e59a66cb8ee7752ecb5ec7814ccbb445475265a83273d79f49789cc339e4e242b09ab7faaa351cd5e7aa8cce58f4f61fe6b1a5ab13acd97a1b45fa42bd5053d74a1efdcb155453844e92af0445e13abde90261920c8fa2369b7e9224371c694ab14952a6c0ea29ae1c2c313"]) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') splice(r0, &(0x7f0000000540), r0, &(0x7f0000000580), 0x7, 0x1) syz_mount_image$bfs(&(0x7f0000000080)='bfs\x00', &(0x7f0000000100)='./file1\x00', 0x4, 0x5, &(0x7f00000004c0)=[{&(0x7f00000001c0)="f7ad3ecf754a345dd353953cd19646a38045ee0f76564ae15b507ae9af279bb66062d726d47984be40c0af46efce978a018c7b42375ebf45dabdaa8416fb062d9340f6f4cad389435f49b79da1e9d34f9fd3560a6457f7005d1b613b60e55e5b3d9aab3e48082c5ba4dfbb5e5c1fc91eceef002272253b1968cdc6968a253f0454293c5da62e00cc20d5f7a651f6d8008586ad6f5d3cd7f39c8077d2d1c819b1d143eb328de7c80b1a855f8eb058cf9e77871292805998e9124e4db8697de629", 0xc0, 0x437}, {&(0x7f0000000380)="a666c4005215de08572ba6e30f77cd676c6d0417a096a4582fe8310156adab589ad53281e0b178ff182c7c8766a80ae670f3e11c089fd1f5e6e16e650b41030608dfcdd627db0bbe37382a4edf8fdfdda85b8214cc05c5468160e5068c49cbcb745ee870068057478988703bb637fb063334b6a175d62e1a184b6e3cdade61d71860caed68ee2ed5b2d2b17f7e39970f8e0e", 0x92, 0x22}, {&(0x7f0000000c80)="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", 0x1000, 0x100000000}, {&(0x7f00000002c0)="f628fb44e75f89ec7566de827a4304f0893bdf913e74995f1473c76918aba17cb008eb4d94b2b0daab556ccda36b3559c647f27a6feba84993a2123fd86f1d916d82551e68e77fefb057137b453f8acdd2e6f83c981eb6fb02a05e372eae6126b7f816c6fe3407baee47d2eb7e29c8c606ddfe65ba", 0x75, 0xf}, {&(0x7f0000000440)="f2c5c9d5e292b26ae4ee36e71ec698bf72ffb6bbb29544ad7c1bc61bc095b861d90b915b34a8497bd348280fa5a91f88e7cdf3f090adb08d2c57b2e4100e58e30041a8522deafea084e04972b14d40", 0x4f}], 0x8000, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x3f00000000000000) 20:16:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f776572646972432e2f66696c65ba2c776f726b6469723d2e2f66696c6531"]) r1 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file1/file0\x00', 0x0, 0x20) ioctl$KVM_GET_PIT(r1, 0xc048ae65, &(0x7f00000002c0)) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 999.519492] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x3a7d0900}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 999.627612] overlayfs: unrecognized mount option "upperdYqI:e0" or missing value [ 999.689939] overlayfs: './file0' not a directory [ 999.702208] overlayfs: unrecognized mount option "lowerdirC./file" or missing value 20:16:34 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000400"}, 0x1c) 20:16:34 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000074000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:34 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0xf6ffffff00000000) 20:16:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x3c000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@local}}, &(0x7f00000002c0)=0xe8) open(&(0x7f0000000300)='./file1/file0\x00', 0x10000, 0x100) quotactl(0x2, &(0x7f0000000200)='./file1/file0\x00', r2, &(0x7f0000000c80)="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") lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:34 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000080)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 1000.263633] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1000.308919] overlayfs: './file0' not a directory 20:16:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x3f000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 1000.338687] overlayfs: './file0' not a directory [ 1000.341037] overlayfs: './file0' not a directory 20:16:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c09fbe7f085776f726b6469723d2e2f66696c6531"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000040)) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000540)=0xe8) mount$9p_unix(&(0x7f0000000100)='./file1/file0\x00', &(0x7f00000003c0)='./file1/file0\x00', &(0x7f0000000400)='9p\x00', 0x4008, &(0x7f0000000680)=ANY=[@ANYBLOB="7472616e733d756e69782c76657273696f6e3d3970323030302c6d73697a653d3078303030303030303030303030303030352c756e616d653d656d30766d6e6574306e6f64657626757365725e236367726f75702b2b2e2a2c63616368657461673d002c63616368653d6e6f6e652c7375626a5f726f6c653d706f7369785f61636c5f6163636573737365637572697401040000000000006f6c653d706f7346785f61636c5f6163636573732c7375626a5f747970653d70707e302c7569643e1675162bc48e7d1b2e25e62d8885323db0188d5e3a7597e0826c15ddca", @ANYRESDEC=r2, @ANYBLOB=',\x00']) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000300)='./file1/file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f00000002c0)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0xffffffff7fffffff) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:35 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531767ef9bd2cc5a8b74e2c5e7c08ab6bd3764789f1883e3dd96883c6a24daf7359ca27832171af62aeffa322aef10165b252ce55d05c927882083cbf6193ca9a234fd962f26af12c73151f9b22f85e735c8da9737e56321ff07eae2014b402ae83ee83"]) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') sendmsg$nl_crypto(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20800001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000440)=@upd={0xe8, 0x12, 0x20, 0x70bd2b, 0x25dfdbff, {{'fpu(pcbc(aes-aesni))\x00'}, [], [], 0x2400, 0x400}, [{0x8, 0x1, 0x400}]}, 0xe8}, 0x1, 0x0, 0x0, 0x840}, 0x0) poll(&(0x7f0000000080)=[{r0, 0x40}, {r0, 0x291e550beec04ca4}, {r0, 0x1}, {r0, 0x1}, {r0, 0x4}], 0x200000000000015e, 0x5355) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0xfeffffff00000000) 20:16:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 1000.440326] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1000.565774] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1000.597709] overlayfs: unrecognized mount option " workdir=./file1" or missing value [ 1000.604307] overlayfs: unrecognized mount option "ŨN" or missing value [ 1000.625548] overlayfs: unrecognized mount option "ŨN" or missing value [ 1000.642546] overlayfs: unrecognized mount option " workdir=./file1" or missing value [ 1000.645295] overlayfs: './file0' not a directory 20:16:35 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000500"}, 0x1c) 20:16:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x40000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:35 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000240)=0xffffffffffffff80, 0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000380)={0x0, @in={{0x2, 0x4e21, @multicast1}}, [0x10000, 0x0, 0x9, 0x7, 0x6, 0x400, 0x2, 0x2, 0x1, 0xffffffffffffff7f, 0x7, 0x181, 0x4, 0x2, 0x401]}, &(0x7f0000000100)=0x100) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000c80)={r1, 0x1000, "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"}, &(0x7f00000001c0)=0x1008) 20:16:35 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d00000f0000000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:35 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = open(&(0x7f0000000200)='./file2\x00', 0x100, 0x40) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x100, 0x80) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0xffffffff00000000) 20:16:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x43000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 1001.278202] overlayfs: './file0' not a directory [ 1001.287283] overlayfs: './file0' not a directory 20:16:36 executing program 4: mkdir(&(0x7f0000000040)='./file1/file0\x00', 0x4) r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000000200)={0x0, 0x1ff, 0x0, &(0x7f00000001c0)=0x81}) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000080)='./file1\x00', 0x0) [ 1001.325464] overlayfs: './file0' not a directory 20:16:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="7570706572646972237ff73d2e2f66696c65302c6c6f7765726469723d2e2f6a696c65312c776f7276fb69723d2e2f6669"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) open$dir(&(0x7f0000000200)='./file0\x00', 0x800, 0x1ac) chdir(&(0x7f0000000440)='./file2\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='qpperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 1001.480857] overlayfs: unrecognized mount option "lowe-dir=./file1" or missing value [ 1001.511111] overlayfs: unrecognized mount option "upperdir#=./file0" or missing value [ 1001.542601] overlayfs: unrecognized mount option "lowe-dir=./file1" or missing value [ 1001.571730] overlayfs: unrecognized mount option "upperdir#=./file0" or missing value [ 1001.582541] overlayfs: unrecognized mount option "qpperdir=./file0" or missing value [ 1001.609901] overlayfs: unrecognized mount option "qpperdir=./file0" or missing value 20:16:36 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000600"}, 0x1c) 20:16:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x48000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:36 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000440)={0x0, 0xf, 0x8, "c3276611edadea109fd5112a600af00e3ad13901ab495903df0b06e610ed3170b55af98cdd80468cccea1c0c7129746cc3f5fab88ec27b25412803b6", 0x33, "66d7a93e741ad5fd7bf0e9510007ec28e1be065d29c77e6978481c1726b0b4f65de36f642db4e26b9b028811b612acb02eaf84d7ec25cfad52004429", 0x50}) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000100)=0x5) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = perf_event_open$cgroup(&(0x7f00000001c0)={0x2, 0x70, 0xabd, 0xf72, 0x8, 0x100, 0x0, 0x1, 0x80002, 0x1, 0xfffffffffffffffb, 0xffffffff, 0x1000, 0x2, 0x8, 0x1, 0x8, 0x1, 0x200, 0x9, 0x1000, 0x1, 0xfffffffffffffff7, 0xa5, 0x8, 0x1, 0x3, 0x0, 0xfffffffffffffffa, 0x1ff, 0x9d, 0x101, 0x1, 0x4, 0x9, 0x5, 0xfff, 0xfffffffffffffffc, 0x0, 0x606f, 0x1, @perf_config_ext={0x0, 0x56}, 0x12101, 0x1, 0x9, 0x8, 0x7, 0x7fff, 0xd4fe}, 0xffffffffffffff9c, 0xa, 0xffffffffffffffff, 0x6) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000380)={0x0, 0xfb, 0xa3, 0x959c8345ef86d6d4, 0x10000, "8582897da194a9e1ec8fc0965d71cb6d", "b33443298c696816c608a5bceb765d4525fa96df3270832f7353417ea8d51fddee2c46175d0c9ccbf7de37e928220f0d24c5fb3653e69284e275798c0c8fd67a2a84861c83649bd1ebf09f2460769614235d5fbdfc4dd8a0ed49b28e4a5993ced59d5d31574a4da6d938ffdfb38df648eff7be39c3618c94cd7020fe10f8aadcfc56fdac8ac477c202e310746547"}, 0xa3, 0x2) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:36 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f667f0065302c6c6f7765726469726b6469723d2e2f66696c6531000000000000000000000000"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:36 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$admmidi(&(0x7f0000000580)='/dev/admmidi#\x00', 0x7, 0x2008413c) sendmsg$nl_route(r1, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=@ipv4_getrule={0x20, 0x22, 0x800, 0x70bd2b, 0x25dfdbfc, {0x2, 0x10, 0x20, 0x3, 0x40, 0x0, 0x0, 0x6, 0x8}, ["", "", "", "", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x8000}, 0x804) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x4000, 0x0) readlinkat(r2, &(0x7f0000000300)='./file1\x00', &(0x7f00000003c0)=""/41, 0x29) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r3 = shmget$private(0x0, 0x3000, 0x808, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f00000005c0)=""/104) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') r4 = shmget(0x3, 0x1000, 0x400, &(0x7f0000ffd000/0x1000)=nil) shmctl$SHM_LOCK(r4, 0xb) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000050050000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 1002.195118] overlayfs: missing 'lowerdir' [ 1002.242126] overlayfs: './file0' not a directory [ 1002.271152] overlayfs: './file0' not a directory 20:16:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') write$binfmt_script(r0, &(0x7f00000002c0)={'#! ', './file0', [{0x20, 'security.ima\x00'}, {0x20, 'mime_typecgroup!vmnet0'}, {0x20, 'security.ima\x00'}, {0x20, '*('}, {0x20, 'overlay\x00'}, {0x20, 'overlay\x00'}], 0xa, "024cc72319428f07294aab120e09755b72fde81c9d8dd2c71232078c0dc01e40a21f64b009518ce88c"}, 0x7c) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:37 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c65318989892295593eb725d18572373286beda78f83a431cbd8941218820b9e2b69bdaa3e4eac6cfa7acab101fa425a0e5dbdab8c7b452bbb6ddd613fa7db3c93726928e37afb5f72f9b82958ee66633f8313f1fc38ef5759aec2711dfdef1f555706626686a2eeb851a5e8ddbea"]) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x1ff, 0x141800) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:37 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x4c000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000003c0)={r2, 0x7, 0x7fff, 0x8, 0x9, 0x100000000, 0x1}) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000002c0)={0x7, 0x4}) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 1002.464194] overlayfs: failed to resolve './file1"Y>%хr72x:CA! ⶛ڣϧ%ڸǴR}7&7/f31?Îu'Upf&hj.^': -2 [ 1002.482760] overlayfs: './file0' not a directory [ 1002.501244] validate_nla: 5 callbacks suppressed [ 1002.501253] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1002.517050] overlayfs: failed to resolve './file1"Y>%хr72x:CA! ⶛ڣϧ%ڸǴR}7&7/f31?Îu'Upf&hj.^': -2 [ 1002.608200] overlayfs: './file0' not a directory 20:16:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f666944837d449064cc12cc7c7302756c65312c776f726b6469723d2e2f66696c6531"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:37 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\a\x00'}, 0x1c) 20:16:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:37 executing program 4: mkdir(&(0x7f0000000080)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x10) lsetxattr$security_selinux(&(0x7f0000000100)='./file1/file0/file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f00000001c0)='system_u:object_r:run_init_exec_t:s0\x00', 0x25, 0x3) chdir(&(0x7f0000000280)='./file0\x00') ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000200)={0x10000, 0x9}) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:37 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x50950900}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x100, 0xfffffffffffffffd) [ 1003.128052] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1003.134505] overlayfs: failed to resolve './fiD}Dd|sule1': -2 20:16:37 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x61000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:37 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 1003.192608] overlayfs: './file0' not a directory [ 1003.202805] overlayfs: './file0' not a directory 20:16:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) accept(0xffffffffffffffff, &(0x7f0000000040)=@ethernet={0x0, @broadcast}, &(0x7f0000000300)=0x12) syz_open_dev$sndseq(&(0x7f0000000680)='/dev/snd/seq\x00', 0x0, 0x10005) sendto(r1, &(0x7f0000000280)="6cc902978183c564802dcb482a587a5346fc39ae184eca", 0x17, 0x20000000, 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) ioctl$sock_inet6_tcp_SIOCINQ(r2, 0x40046109, &(0x7f0000000300)) close(r2) chdir(&(0x7f0000000200)='./file2\x00') openat$autofs(0xffffffffffffff9c, &(0x7f0000000540)='/dev/autofs\x00', 0x2, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:38 executing program 4: r0 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x40000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_u='version=9p2000.u'}, {@version_u='version=9p2000.u'}, {@version_L='version=9p2000.L'}, {@access_user='access=user'}, {@version_L='version=9p2000.L'}, {@access_user='access=user'}, {@debug={'debug'}}], [{@smackfsroot={'smackfsroot'}}, {@appraise_type='appraise_type=imasig'}, {@fowner_gt={'fowner>', r2}}]}}) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x20400, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 1003.307912] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:38 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x63000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 1003.405311] overlayfs: failed to resolve './file1ߋ [ 1003.405311] ~HT~}B 0(XuҪQs^w*+U_XKjoc': -2 [ 1003.477528] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1003.491261] overlayfs: './file1' not a directory [ 1003.496365] overlayfs: failed to resolve './file1ߋ [ 1003.496365] ~HT~}B 0(XuҪQs^w*+U_XKjoc': -2 [ 1003.532225] overlayfs: './file1' not a directory [ 1003.546058] overlayfs: './file0' not a directory 20:16:38 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x68000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:38 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\b\x00'}, 0x1c) 20:16:38 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x4b) 20:16:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000100)={0x0, 0x1}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000300)={r2, 0x1aad, 0x2, [0x3, 0x4]}, 0xc) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000200)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x380, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2eae66696c65312c776f726b6469723d2f2f66696c6531"]) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) prctl$PR_GET_DUMPABLE(0x3) chdir(&(0x7f0000000300)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 1004.057171] overlayfs: failed to resolve '//file1': -2 [ 1004.067881] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:38 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x6c000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1004.100938] overlayfs: failed to resolve '//file1': -2 [ 1004.105284] overlayfs: './file0' not a directory [ 1004.117353] overlayfs: './file0' not a directory 20:16:38 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') fsetxattr(r0, &(0x7f0000000080)=@known='trusted.overlay.origin\x00', &(0x7f0000000100)='[)\\\x00', 0x4, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x8) 20:16:38 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000200)='./file1\x00', 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) socket$inet(0x2, 0x4, 0x10001) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) fcntl$notify(r0, 0x402, 0x4) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000300)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='overlay\x00', 0xfffffffffffffffc, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) ioctl$SG_GET_ACCESS_COUNT(r1, 0x2289, &(0x7f00000002c0)) [ 1004.257199] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x71000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 1004.364195] overlayfs: './file0' not a directory [ 1004.397106] overlayfs: './file0' not a directory 20:16:39 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) recvfrom$inet6(r0, &(0x7f0000000080)=""/26, 0x1a, 0x10000, &(0x7f0000000100)={0xa, 0x4e24, 0x1, @mcast2, 0xfffffffffffffffb}, 0x1c) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet6_buf(r0, 0x29, 0x1c, &(0x7f00000001c0)="c7b0730f4366eb65cdec8424d9db263da4dd3abcabae6ffdf617827962a469adea4b1d93822bf164343f5c9d67670bc9bedc36574865de2164884e7f03b71c802b4a3f3faee0458ef0510eea935c651af3fc004ac304ab9acefdacea8c9c02f36923627661b1451029bd28b713c36a0459e57ec0cabf03549775316ed7455256dc5989e73b4d", 0x86) [ 1004.424547] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1004.483114] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1004.575039] overlayfs: './file0' not a directory 20:16:39 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\t\x00'}, 0x1c) 20:16:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000003c0)={'filter\x00', 0xa6, "96429cdb4fecaeeec78a69d02da60a14987aa8a226c87ce67e2ef1a9e243628d008a77c6a3e2f24ffc92af55b42cf50e1b440362e7320fc31c0ec2a2160b3077306b04f5a19070c05d2b7430bc5aef72cc3fddd53b5e3edfd8f80e7277f60fdfe651f4f4c9ce837385b7ca940c447150c4428409189431c82110b1e0f29233fa0a516ecbbce54599749223a56038d53ab5e23b6ac0de726b247f060fd3d0167c90f9215e2e29"}, &(0x7f0000000200)=0xca) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0xffffffffffffff61, 0x0) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f00000001c0), 0x4) open$dir(&(0x7f00000002c0)='./file1/file0\x00', 0x600, 0x0) 20:16:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') pselect6(0x40, &(0x7f00000001c0)={0x418c, 0x5, 0x9, 0x9370, 0x2, 0x8, 0x8, 0x80000001}, &(0x7f0000000300)={0xb488, 0x80000000, 0xd4f6, 0x0, 0x1, 0x0, 0xffffffff, 0x1}, &(0x7f00000003c0)={0x12b3, 0x3, 0x26d, 0x3, 0x9, 0x80000000, 0x3, 0x9}, &(0x7f0000000400)={0x0, 0x1c9c380}, &(0x7f0000000480)={&(0x7f0000000440)={0x100000001}, 0x8}) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000002c0)='./file0/file0\x00', 0xfffffffffffffffc, 0x4) 20:16:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x73000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:39 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) r0 = geteuid() r1 = getegid() lchown(&(0x7f0000000080)='./file1\x00', r0, r1) mkdir(&(0x7f0000000180)='./file0\x00', 0x10) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x10000000000) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:39 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000004c0)=[@text32={0x20, &(0x7f0000000400)="b9800000c00f3235010000000f301c000f01cbb9800000c00f3235010000000f300f01c86736f36f0f01df0f2083ea0058000065000fc79b01000000", 0x3c}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = dup3(r0, r0, 0x0) ioctl$IOC_PR_CLEAR(r3, 0x401070cd, &(0x7f0000000080)={0x3}) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 1005.029836] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1005.065321] overlayfs: './file0' not a directory 20:16:39 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000110000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x74000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1005.108428] overlayfs: './file0' not a directory [ 1005.117561] overlayfs: './file0' not a directory 20:16:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') execve(&(0x7f00000002c0)='./file1/file0\x00', &(0x7f0000000440)=[&(0x7f0000000300)='security.ima\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='\x00'], &(0x7f0000000680)=[&(0x7f0000000480)='/\x00', &(0x7f00000004c0)='security.ima\x00', &(0x7f0000000500)='security.ima\x00', &(0x7f0000000540)='*bdevselinux\x00', &(0x7f0000000580)='.\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='overlay\x00', &(0x7f0000000640)='#vmnet1&/eth1bdevtrusted-\x00']) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000500)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x7ffffffffc, &(0x7f0000000440)=ANY=[]) r1 = dup3(r0, r0, 0x80000) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 1005.194617] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x7a000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1005.399693] overlayfs: './file0' not a directory [ 1005.399834] [ 1005.406128] ====================================================== [ 1005.407738] kobject: 'kvm' (000000005648f35d): kobject_uevent_env [ 1005.412437] WARNING: possible circular locking dependency detected [ 1005.412446] 5.0.0-rc5 #60 Not tainted [ 1005.412450] ------------------------------------------------------ [ 1005.412457] syz-executor1/7244 is trying to acquire lock: [ 1005.412463] 00000000eb7d2e7d (&ovl_i_mutex_dir_key[depth]){++++}, at: lookup_slow+0x4a/0x80 [ 1005.412503] [ 1005.412503] but task is already holding lock: [ 1005.419108] kobject: 'kvm' (000000005648f35d): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1005.425038] 000000000380b084 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 1005.425064] [ 1005.425064] which lock already depends on the new lock. [ 1005.425064] [ 1005.425068] [ 1005.425068] the existing dependency chain (in reverse order) is: [ 1005.425072] [ 1005.425072] -> #3 (&sig->cred_guard_mutex){+.+.}: [ 1005.425111] __mutex_lock+0xf7/0x1310 [ 1005.425128] mutex_lock_killable_nested+0x16/0x20 [ 1005.505405] lock_trace+0x4a/0xe0 [ 1005.509407] proc_pid_syscall+0x98/0x250 [ 1005.514001] proc_single_show+0xf6/0x180 [ 1005.518579] seq_read+0x4db/0x1130 [ 1005.522657] do_iter_read+0x4a9/0x660 [ 1005.526974] vfs_readv+0xf0/0x160 [ 1005.530952] default_file_splice_read+0x475/0x890 [ 1005.536312] do_splice_to+0x12a/0x190 [ 1005.540628] splice_direct_to_actor+0x2d2/0x970 [ 1005.545810] do_splice_direct+0x1da/0x2a0 [ 1005.550470] do_sendfile+0x597/0xd00 [ 1005.554707] __x64_sys_sendfile64+0x1dd/0x220 [ 1005.559730] do_syscall_64+0x103/0x610 [ 1005.564135] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1005.569829] [ 1005.569829] -> #2 (&p->lock){+.+.}: [ 1005.574942] __mutex_lock+0xf7/0x1310 [ 1005.579261] mutex_lock_nested+0x16/0x20 [ 1005.583842] seq_read+0x71/0x1130 [ 1005.587815] proc_reg_read+0x1fa/0x2c0 [ 1005.592225] do_iter_read+0x4a9/0x660 [ 1005.596542] vfs_readv+0xf0/0x160 [ 1005.600512] default_file_splice_read+0x475/0x890 [ 1005.605873] do_splice_to+0x12a/0x190 [ 1005.610191] splice_direct_to_actor+0x2d2/0x970 [ 1005.615379] do_splice_direct+0x1da/0x2a0 [ 1005.620040] do_sendfile+0x597/0xd00 [ 1005.624274] __x64_sys_sendfile64+0x1dd/0x220 [ 1005.629286] do_syscall_64+0x103/0x610 [ 1005.633689] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1005.639394] [ 1005.639394] -> #1 (sb_writers#3){.+.+}: [ 1005.644884] __sb_start_write+0x20b/0x360 [ 1005.649560] mnt_want_write+0x3f/0xc0 [ 1005.653892] ovl_want_write+0x76/0xa0 [ 1005.658220] ovl_do_remove+0xe9/0xd70 [ 1005.662546] ovl_rmdir+0x1b/0x20 [ 1005.666426] vfs_rmdir+0x19c/0x470 [ 1005.670484] do_rmdir+0x39e/0x420 [ 1005.674454] __x64_sys_rmdir+0x36/0x40 [ 1005.678859] do_syscall_64+0x103/0x610 [ 1005.683260] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1005.688964] [ 1005.688964] -> #0 (&ovl_i_mutex_dir_key[depth]){++++}: [ 1005.695728] lock_acquire+0x16f/0x3f0 [ 1005.700049] down_read+0x3b/0x90 [ 1005.703931] lookup_slow+0x4a/0x80 [ 1005.707987] walk_component+0x74b/0x2000 [ 1005.712563] link_path_walk.part.0+0x980/0x1340 [ 1005.717752] path_openat+0x1f9/0x4690 [ 1005.722071] do_filp_open+0x1a1/0x280 [ 1005.726392] do_open_execat+0x13b/0x6d0 [ 1005.730881] __do_execve_file.isra.0+0x178d/0x23f0 [ 1005.736517] __x64_sys_execve+0x8f/0xc0 [ 1005.742136] do_syscall_64+0x103/0x610 [ 1005.746538] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1005.752234] [ 1005.752234] other info that might help us debug this: [ 1005.752234] [ 1005.760359] Chain exists of: [ 1005.760359] &ovl_i_mutex_dir_key[depth] --> &p->lock --> &sig->cred_guard_mutex [ 1005.760359] [ 1005.772319] Possible unsafe locking scenario: [ 1005.772319] [ 1005.778533] CPU0 CPU1 [ 1005.783184] ---- ---- [ 1005.787839] lock(&sig->cred_guard_mutex); [ 1005.792147] lock(&p->lock); [ 1005.797761] lock(&sig->cred_guard_mutex); [ 1005.804603] lock(&ovl_i_mutex_dir_key[depth]); [ 1005.809350] [ 1005.809350] *** DEADLOCK *** [ 1005.809350] [ 1005.815401] 1 lock held by syz-executor1/7244: [ 1005.819968] #0: 000000000380b084 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 1005.829770] [ 1005.829770] stack backtrace: [ 1005.834263] CPU: 1 PID: 7244 Comm: syz-executor1 Not tainted 5.0.0-rc5 #60 [ 1005.841266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1005.850606] Call Trace: [ 1005.853192] dump_stack+0x172/0x1f0 [ 1005.856828] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 1005.862186] __lock_acquire+0x2f00/0x4700 [ 1005.866790] ? zap_class+0x460/0x460 [ 1005.870505] ? lockref_get_not_dead+0x70/0x90 [ 1005.874998] ? mark_held_locks+0x100/0x100 [ 1005.879233] ? lock_downgrade+0x810/0x810 [ 1005.883387] lock_acquire+0x16f/0x3f0 [ 1005.887186] ? lookup_slow+0x4a/0x80 [ 1005.890908] down_read+0x3b/0x90 [ 1005.894269] ? lookup_slow+0x4a/0x80 [ 1005.897979] lookup_slow+0x4a/0x80 [ 1005.901514] walk_component+0x74b/0x2000 [ 1005.905570] ? capable_wrt_inode_uidgid+0x95/0xd0 [ 1005.910420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1005.915970] ? path_init+0x18f0/0x18f0 [ 1005.919880] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1005.925414] ? revert_creds+0x130/0x170 [ 1005.929381] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1005.934931] ? security_inode_permission+0xd5/0x110 [ 1005.939982] ? inode_permission+0xb4/0x570 [ 1005.944222] link_path_walk.part.0+0x980/0x1340 [ 1005.948897] ? walk_component+0x2000/0x2000 [ 1005.953241] path_openat+0x1f9/0x4690 [ 1005.957035] ? __kernel_text_address+0xd/0x40 [ 1005.961529] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 1005.966193] ? save_stack+0xa9/0xd0 [ 1005.969821] ? save_stack+0x45/0xd0 [ 1005.973442] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1005.978557] ? kasan_slab_alloc+0xf/0x20 [ 1005.982612] ? kmem_cache_alloc+0x12d/0x710 [ 1005.986930] ? prepare_creds+0x3e/0x3c0 [ 1005.990905] ? prepare_exec_creds+0x12/0xf0 [ 1005.995226] ? __do_execve_file.isra.0+0x393/0x23f0 [ 1006.000240] ? __x64_sys_execve+0x8f/0xc0 [ 1006.004395] do_filp_open+0x1a1/0x280 [ 1006.008221] ? mark_held_locks+0x100/0x100 [ 1006.012464] ? may_open_dev+0x100/0x100 [ 1006.016440] ? check_preemption_disabled+0x48/0x290 [ 1006.021453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1006.026986] ? debug_smp_processor_id+0x1c/0x20 [ 1006.031646] ? perf_trace_lock+0xeb/0x510 [ 1006.035788] ? perf_trace_lock+0xeb/0x510 [ 1006.039928] ? zap_class+0x460/0x460 [ 1006.043656] ? zap_class+0x460/0x460 [ 1006.047361] ? __lock_is_held+0xb6/0x140 [ 1006.051420] ? check_preemption_disabled+0x48/0x290 [ 1006.056448] do_open_execat+0x13b/0x6d0 [ 1006.060420] ? unregister_binfmt+0x170/0x170 [ 1006.064839] ? lock_downgrade+0x810/0x810 [ 1006.068982] ? kasan_check_read+0x11/0x20 [ 1006.073129] ? do_raw_spin_unlock+0x57/0x270 [ 1006.077533] __do_execve_file.isra.0+0x178d/0x23f0 [ 1006.082458] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1006.087473] ? copy_strings_kernel+0x110/0x110 [ 1006.092048] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1006.097597] ? getname_flags+0x277/0x5b0 [ 1006.101660] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1006.107023] __x64_sys_execve+0x8f/0xc0 [ 1006.111043] do_syscall_64+0x103/0x610 [ 1006.114949] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1006.120128] RIP: 0033:0x457e39 [ 1006.123316] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1006.142215] RSP: 002b:00007fee9bf78c78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 1006.149915] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 1006.157177] RDX: 0000000020000680 RSI: 0000000020000440 RDI: 00000000200002c0 [ 1006.164454] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 1006.171721] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fee9bf796d4 [ 1006.178986] R13: 00000000004be429 R14: 00000000004cebc8 R15: 00000000ffffffff [ 1006.210956] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1006.220592] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1006.232988] overlayfs: './file0' not a directory 20:16:41 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\n\x00'}, 0x1c) 20:16:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='security.SMACK64MMAP\x00', &(0x7f0000000300)='wlan1\x00', 0x6, 0x1) 20:16:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x85ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000540)={{{@in=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@initdev}}, &(0x7f0000000640)=0xe8) fstat(r0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_xen(&(0x7f0000000480)='security.ima\x00', &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='9p\x00', 0x8042, &(0x7f0000000700)={'trans=xen,', {[{@cache_mmap='cache=mmap'}, {@cache_mmap='cache=mmap'}, {@dfltuid={'dfltuid', 0x3d, r1}}, {@dfltuid={'dfltuid', 0x3d, r2}}, {@noextend='noextend'}], [{@fsuuid={'fsuuid', 0x3d, {[0x61, 0x77, 0x65, 0x7b, 0x63, 0x38, 0x37, 0x37], 0x2d, [0x77, 0x35, 0x74, 0x61], 0x2d, [0x7f, 0x67, 0x31, 0x77], 0x2d, [0x77, 0x0, 0x37, 0x33], 0x2d, [0x73, 0x61, 0x3f, 0x61, 0x32, 0x79, 0x7f, 0x38]}}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@euid_eq={'euid', 0x3d, r3}}, {@audit='audit'}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@dont_appraise='dont_appraise'}, {@obj_role={'obj_role', 0x3d, '&vboxnet1!^'}}, {@dont_appraise='dont_appraise'}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user', 0x3d, 'security.ima\x00'}}]}}) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065720cae9c9e4baca22966696c650000776f726b6469723d2e2f66696c6531"]) r4 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) connect$vsock_dgram(r4, &(0x7f00000002c0)={0x28, 0x0, 0xffffffff, @host}, 0x10) getpeername(r4, &(0x7f00000003c0)=@un=@abs, &(0x7f0000000440)=0x80) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r4, 0x800454d7, &(0x7f0000000300)) [ 1006.267928] kobject: 'kvm' (000000005648f35d): kobject_uevent_env [ 1006.277985] kobject: 'kvm' (000000005648f35d): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 1006.281923] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env 20:16:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 1006.326996] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1006.349279] kobject: 'loop2' (00000000a5db2155): kobject_uevent_env 20:16:41 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) symlink(&(0x7f0000000080)='./file1\x00', &(0x7f0000000100)='./file1\x00') mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) fremovexattr(r0, &(0x7f00000001c0)=@known='system.posix_acl_default\x00') 20:16:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x9cffffff}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1006.375974] kobject: 'loop2' (00000000a5db2155): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1006.379127] overlayfs: './file0' not a directory [ 1006.408678] overlayfs: unrecognized mount option "upper K)file" or missing value [ 1006.410915] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env 20:16:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:41 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000400)='./file2\x00', 0x20) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f666907000000776f726b6469723d2e2f22e46c6531"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) open$dir(&(0x7f0000000200)='./file0\x00', 0x42180, 0x80) [ 1006.458834] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1006.461136] overlayfs: unrecognized mount option "upper K)file" or missing value [ 1006.479807] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1006.496174] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' 20:16:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x9fffffff}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1006.499495] overlayfs: './file0' not a directory [ 1006.526606] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env 20:16:41 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') setsockopt$bt_hci_HCI_DATA_DIR(r0, 0x0, 0x1, &(0x7f00000002c0)=0xb693434, 0x4) truncate(&(0x7f0000000040)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f00000001c0)={0x0, 0x0, 0x1, 0x58, 0x2, 0x7f, 0x6, 0x6, {0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x28}}}, 0x4, 0x8, 0x10000, 0x5fe727ec, 0xca6c}}, &(0x7f0000000080)=0xb0) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r1, 0x7f, 0x10}, 0xc) [ 1006.553073] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1006.574115] overlayfs: missing 'workdir' [ 1006.583901] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env [ 1006.603573] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1006.607819] overlayfs: missing 'workdir' [ 1006.618499] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1006.627518] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1006.641980] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1006.649363] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1006.661276] overlayfs: './file0' not a directory [ 1006.663677] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1006.675047] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1006.688626] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1006.695472] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1006.710319] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1006.725638] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1006.741173] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1006.748584] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' 20:16:41 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000000e00"}, 0x1c) 20:16:41 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@multicast1, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, 0xfffffffffffffffd) r2 = geteuid() lstat(&(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$hfsplus(&(0x7f00000002c0)='hfsplus\x00', &(0x7f0000000300)='./file1\x00', 0x19e5, 0x1, &(0x7f0000000480)=[{&(0x7f00000003c0)="d6aa21db3f3d54c9ac9d47874bd5c153681192ce937a21de8800ea79d1ddc325557ddeb879ce25282f3634a64658407db94265eba857bcc86f79245bae29e36cccaddd33e5fa02d8a1ff44718066b307ce59742ed5d089e539436e4064bc6553bf3bdc8efec7fd4768b3ad6fb95f7fff40cc4f948daffed03b469f25ec50f7e8c14504356f52f7c20e0f1ffc6d107d1b9b8bd6840089616880a84c1de557d711dfb4ddd0c7153cd147244b2e38d4fb891c", 0xb1, 0x7}], 0x82000, &(0x7f0000000680)={[{@uid={'uid', 0x3d, r1}}, {@force='force'}, {@barrier='barrier'}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@uid_eq={'uid', 0x3d, r2}}, {@permit_directio='permit_directio'}, {@obj_user={'obj_user'}}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x0, 0x0, 0x36, 0x32, 0x30, 0x0, 0x39], 0x2d, [0x3f, 0x77, 0x66, 0x62], 0x2d, [0x0, 0x77, 0x37, 0x37], 0x2d, [0x63, 0x7f, 0x77, 0x73], 0x2d, [0x36, 0x77, 0x65, 0x64, 0x77, 0x7f, 0x72, 0x61]}}}, {@subj_role={'subj_role', 0x3d, 'security.ima\x00'}}, {@euid_lt={'euid<', r3}}]}) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x1) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xe4ffffff}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e4b66696c65312c776f726b6469723d2e2f6642696c6531d04fb615bbefeae66537a4157085f95e5f8961b8382cabdcd97abcec55e26a3d3ad74a3174c5578f99378a1fba04077f29030bf9fb8f3425f2e6a69e1f03"]) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r0, 0x110, 0x5, &(0x7f0000000200)=[0x3, 0x4], 0x2) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r1, 0xc008551b, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000018000000fdffffff04000000aebd000006000001ff07000000959ad4364a27df955e4209ca663d532fa6e0a46dcb751470a352e96bd6af4a315fa72aa658e89a344a437d598fc01555644b2854c16952a9fbf28fa0efb39d4f9f48f173bc97e2bfd971cdc662d683f26d972f4b474f63fb5f85e3233804d57fc78f971b"]) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:41 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x121) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x10000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000100)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r0, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r1, 0x9, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1c}}, @in={0x2, 0x4e21, @loopback}}}, 0x118) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 1007.167096] kobject: 'loop2' (00000000a5db2155): kobject_uevent_env [ 1007.193597] kobject: 'loop2' (00000000a5db2155): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1007.211073] overlayfs: './file0' not a directory 20:16:41 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xfa000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1007.220646] overlayfs: unrecognized mount option "zUj=:J1tW7) 4%榞" or missing value [ 1007.232773] overlayfs: filesystem on './file0' not supported as upperdir [ 1007.250807] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env 20:16:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000400000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:42 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000380)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000100)=0xe8) r1 = getegid() lchown(&(0x7f0000000080)='./file1\x00', r0, r1) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') sendto(r0, &(0x7f00000003c0)="5d5554b4dcafc7fac80444edbc757b75a5237c0973a1b0a66c66ea858a37bbb939aed6ded82b22587e223e9eb3dd9535ab5bcd6380507bfd56d4fc408d3e09779d17bbaca7d0b9ee5e3e15c8b0c5071f23419f973e6e7f9771e4f637dd76e159e18e057d7ff4dc70225486b20bca64", 0x6f, 0x4000000, &(0x7f0000000440)=@pppoe={0x18, 0x0, {0x2, @link_local, 'lo\x00'}}, 0x80) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 1007.261599] overlayfs: unrecognized mount option "zUj=:J1tW7) 4%榞" or missing value [ 1007.280949] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' 20:16:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000480000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f6669098abfa19d97460c006c65302c6c6f7765726469723d2e2f"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001880)={{{@in=@loopback, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000001980)=0xe8) bind$can_raw(r1, &(0x7f00000019c0)={0x1d, r2}, 0x10) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000400)='./file0\x00', 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_MCE_KILL_GET(0x22) mount(&(0x7f0000000040)=@nullb='::,,\nnullb:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 1007.313478] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env [ 1007.319931] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1007.369986] overlayfs: './file0' not a directory [ 1007.377083] overlayfs: missing 'lowerdir' [ 1007.385983] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1007.399088] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1007.409344] overlayfs: missing 'lowerdir' [ 1007.420718] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1007.427852] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1007.430044] overlayfs: missing 'lowerdir' [ 1007.440646] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1007.448635] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1007.455293] libceph: parse_ips bad ip '::,, [ 1007.455293] nullb' [ 1007.470725] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env [ 1007.481223] audit: type=1804 audit(1549397802.197:151): pid=7342 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir619555362/syzkaller.NiRR3t/420/file0/file1" dev="sda1" ino=16511 res=1 [ 1007.494038] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1007.521306] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1007.532320] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1007.547319] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1007.556508] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' 20:16:42 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b84273e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d419900d25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="0000001000"}, 0x1c) 20:16:42 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xff000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:42 executing program 4: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) truncate(&(0x7f0000000080)='./file1\x00', 0x400) 20:16:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c65312d5873b4c7c85e8b846ccba6ea3d711234b38fe6e06a64fb286716ab646b7330df8c49f0abd181d3df7a208a67d768326cfe89621f831c9563fc9358f349dbf266"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000c80)={0x0, 0xfb, 0x1015, 0x0, 0x3, "4fc4aad751c57d9c2f89eb89c997f911", "745641b0c320dd0cc571d4b6d2ff7faa5bdb2bd8ec291a948ff58630f096721afe4e64b1c433f33843db2c00dae14a913f6e5d6edb81830cbfb097f53dd94cadbea765fb2bbbd73408576b4fcb50e4e5f028d1c114c9d114cb13fa2a85afaaa86f4971832ac11c9eb9b7ac318704fc95464b41a9a1ff2ae30d57570eff01b84cb1192c088c08509d479f39839881fecc0bda04ddae3ba69e4602dd2cdd7a2b6c13dbb3c4fc89fd32b65e06352901ae1f70b8714c561e68a928a628f1164751f6f5ac889c1dd4f468b822a8e2dfbd3396fc98238c26b3dca6cdf5b50553258115c2668681f514780df5661827eee99b6de03bffc4b66417706ca5e1d8a901259341046711dbd3007ab2404a32eaa30dd8891446f54e12c025fd382e6c9892d9f078223d015bdf97b1c3da3cd593ebf6f8fe2187698744fb82d05e0de7fc1c9eada0b1e299f654d0e4fa67f2d66371271015bfaffd946d8c13266373e8e02c0e48bfbfc743a4255814161ac6b1d8fabb1040c01ac03a407c0c89a01ce3d59c75828ea5abcb0a5a38568fe930d2caeb569bb7ef530353be7c15f5d638710db83c03d38a0408e8a73735d26cf5c4d37c9a2f06a7949be4ff58e1569985c6a3d404dedb1b896b5a526bf5471ed0dff870ec9c50a7a8ad9823ea26dfe158cacb17162475a488c2e26fade4acc6ab063c068bf6d45c290e1d776d671d52f05c17a373c56a29ad64d189b8a59238541711414e2864acd70c1866d880245048e74adcac97982bb1de3b5a0c7f90dcacbf8f6b4b7510bcc423d4883090fe75b4b5ccaee2c721138db9205085fa0cc06edac24ce04985f2775f3525ddbc6ec3feece8496c9b67576f721d72795185fa1a46e760d76a24ea98b36dbfb9e8099d4ab7484b14b95fa571dff32d79c0e7b6a0f7c5202eb4f0ec14864c8d67f80626df6dab179915431deb7fbf2af2856c602604c1f29e2d2ba54b18d2b9bb0349cc967a737d250a79772bbf5c019e129902cb0ccaa06a4b291dc42b6b8435794c9f2dcfe1b1bd9eb67caf34b6e8c131c61964f04ccae422ff7a8136fe880df4e78af3888068739fd2882126981aa924c523881a5ec5c3e47edb7603823a32e04cbb2a6b5e623843d5ec49f4e10cce91a2cd3328a57e73a930bbb8d8911701da7445e100e510800edc973db9374d9525f6179ca39f681bc30221d7431e38c0f19fed9817dce8df214eed03533336a08ffcb8f6e98ff522f5afae4dbd85de98778ab367b2d8c1514f8d62ecf39205707cc24572dea23e4312dae60ef823eeb0491ff49d9d1364cdcf66d3850ada1d72615ff9fd42dfd228afd4f21a80ec4c3e19e9e0480730d03b5decf3e9f03d2aced21d107e6f752e8e65ca933765ffd90d28b2b6e6a1a93f22f9f0d4e8cf85a3dac5637c71f7bb374d748e0a8002f333feb608ff8a72a989cdb8ad038269de35bee060dc4ec6051a98794766230626f1fcffbe4ae92bee63a39eff0747d056ee2f7afe1c9b22db4bff88eb7e9ae118cc33ad72fa97ff40bca2e94eb97d9a473ffbaea1204b1e067106556a05a65b31a5b4b377e773b346132d85edb085a9cdd6dd532af404aa592b1144ce26fa1bb90bb6c4e045a040c53c8dbb21618c8918925e28533772f61d2436610b5185c07cc2956ff177fb3f8c8505652668a02f49a9e8bc0a8dcf60e9f3ad53c1de33bb2fb8dae0255de5e58c4b6d9007436538f2669dc31403273067083b604884a657aff713d76f68c7c6bb8ae8ee0b3c722b937999f5de53adabc1d7f413e5045b355cec9be1eb42ea1c0f544d90927a89402de6b86b172e044c6447b6f95df81c5523993807acf757c2442a2411f073258008c40395028957b4cb58aecdbbc432b2558c677b192beb7cd399eab5059bb351cad9fdfac6d6ebe4c924dea263cfef7c235533e23894a8cb877910d8dd8c2c3f76dac979d70001d17909f8ac6163b407e300b6290e545f630d916ee631171adb28889c5991136e46bf39e5bd76d9391ea0196cd26e353757069e3213f9490bbd0d11e88b868e1a9ba7a8490886fdabbe67099b88aaa3a5ab49c914fc40c43166f2cf48d7991b4674dbae411c3e5401eb168bdd27767bb600f1b857c9c23478395c2074d51de2466a04ff9dc2d41a35961a43c3b9e97bf0c0108fa65ae66b0e3653cf4efadbe985caef37042183acfa768c6cffa24c6036351da0a5a2ec46e95980f16c56172a66ccf1d290efa528d8255a15ecb54be82b00f4ed529fa1a493b8553051cbf88b23a6b4210e78bf859ea684c99006f95149946d97dc8ba5e639cdb1e23593bf875aade61ff3583f0192523072da87c4c12bf0341da8f7b3a8340bf6127bb546a9763bae0d1a5a65cbf932a85b360f532912ae0262223376f474815e9cc70df3b9533ec80df49d18a0a43c63c1c55f73fa4161afd52d36b90ba77994455cc57cae4efed65a0de2223ae0eb71a994291c3a5c0cb16869627dcbdd197d74b4315ee971d324281a621b48f4f4fbf18f664d1822d3f00a64c32a744a7e3f03ffcd46b8dcdab4bee3673919273eee2daf7358c0cf11165cc70b65e9e4eddc292f13a573919e3d5800ee27939d995193c9dcbedff12257d9c09b2b17536b9ef40aca08f994edd8e80138a3fcd9f0a4f1123d0de3a732fb01b1a0f249c5cc8c3d34a734fe9eaedc23913984c13b5d67eae9e28b174a9ed80b31e3cb64829a163308dd111b75f748e3ea63bce65b8a975e8e95e132254ad498c21ff5181cc40ca555fce63f0edcd2e1048603667198d6917fffa19b85dab8d9e6d22a45df1a172c3b9d6074ccbb6ba7818f996e138b794b6f6a19dc125c9045413efa3d1608730e02263c8a801b469725e03cb7ea7e33e947226696417772573c14ac26060206e37d16f468b4ca7b3913ebc1d633b187da8baa71eb6425a4c8ba242c6a7f190e3704498f9f35aac05779065f67d4fb78ba51a68e5c7383579422c322a0ccf9bac569e6be0549f521f49c95b660ad6daf61adf446f8baa47d7e43e7a3b2322cbff2ebed2692ad976aff23354cedc051388be080086b34bb4e82c67d806e1bbb4fd440010df2e33b7168fad60ca48adcb003e854c53d1c69e49b828c08509eb0bae829862004d9da6be31182a593bea18d9cab4f4e2fd47b73ae6daa6c3d34227a0c253f87fc496cfaab3125d4bd970f8df2b4ff5e8b6401d8139f3537ce790a9df400b5149017c169aba0a60af36fbf64a91d56504f38837e68cb9cd5b038481afaf73adbb9d4098567f555b4506369c3cc43f01036c9639fa96fcdf7684fc8f7e39f0859bfea3b7fb2abdd5e0d55f1c3a2602183ebace61229baf7d23d8151702cebb08fff2f98ac71f73d0c1795c8eb492bb6ffe0d8390085b8c70a00deed70ae2ff3ad22d36e6260e67c01cbf1215a6f6644adf5a4c4f3320a891e31da9d7b689f86f3990971144e70ee111d086c4e18b0fee1fe143b15320426ee5f0f28d1bbcef14d5a2af452e6d32688e14043a1cd25366ac837d4db1d8304cc6b604adfc144e04eedddb19f04e8f26ba89a9c0c64eeb056d19b22772b8ffc8a5658ae4295cfc51bd482ade4c3775b1b925810682c89e2e83adbec5a2bcb95be27b87c65b9a603965e2b0b6582eece0346490fda9afa98d661948ce36b391f9a936b7a96ff69a365dcf1350a2138093b0af4c913664eb9e46b1b7a81c1f0a61a7515c900c5c99dab0407f27d380af6aebdbbb43bb84e5146d177a2f0e886a36313199cac68601f1fb3ab54721370799e3db265c7fc58a0df114777371d8413e781e5ff595fb8f5e3e29f641c6d396af0f32c5257cd0e2de2671c60063612938edd17c232b8fe6e032af4352fb2c8ba869ccdbe8a7eb014ea07ffa77395ce77d9bb0eff368dba4bc9185fa2d4fe53d0f18cbd98d6bf424d4c82a82b33668269608764ea704c65fca23a0d0c8b72019ba0143308b22be99503373e6749664f7fabba4313f991b3a9e6c11447cf6bae70297dc945181109f5336ad99fbad22c5b0c3769c31b00d9819520cd8e3714910ddc31a3f96d4afec82fcaddca49a9566fd7b51592bd141c6249fb2c84252167fb9a8a347a721d1c19ece488865b48d4e0a7e706d6ae32f32a0b1bdafc09e53d3af4c77cdd68f0597055e9164afde2e168e2ed05a9496704b160c94cc729e3fae3203c72a8a2b9803be190c9b28ed6650ca771459d7f437d9e2d1100c8d2fe731eaa24a5020c5d6efe4fdc64f5bbe779d2bb64893e6db9725d37bd7661085911cf42cadd696f9cd268416ddc53d5df887201cb2a3900754535e655f4bd7aa354938669f4b302214b46fbb775223f8f98f0fbb03d04c4801c37ef2d2c914d1c8dd761ecfde5e01ec81d711e96ef65526f7adc8ac8a8065df157e2101b79a3a2c59803a7d476270ab03052304245bac6111b6434e0e58e3c101a9db277c18dc105720230c67dbe46f6049d25e887b0f0b72623520699331921b27718efed084a17d726f0f6e071a9cbca8b9fa7be684205d7ce604213dcd293be4c471e216c35ec1c72d6b619109720e81d7b43cd881a8914593606736e6b572b40e98246ea98cd13c963268055ce95c46fa4b4f0b058a1d731c4c0526b6c7c8eb1fa30d7092c61180f6dca513bc65a526e7f35ad7f8d6cf85027ca36c82792b54be1d1f8c00e4979652e1e82060fa3279d03b5faf48d36e3709e2b266b01904f71efeca5d5074a1f8cc96fc7837595063feed59f261b93669370eb33739b6a9136d0c06beeb823600699229e6848aa3dd98b3c4fdf260b2620689145c28d06536a5f3ccdb8bb61b230983d921178d11352dc19c028dc40b12c4643bf0e71f0ddc6b16cb7f25e61e1a4ec971fab3c0e541d51b8a9c035a5230f90b411e04b2a60ea582edfd2f950e2097259af5ddb9ac3882a1168cbc3a5c3d28868742d2cfa6ae44a0069eff016239e8eb078908a854410c86fdd8fbf7975facf3ad5b348f8a0df4aa1bdd5ee93969faea22842c4ddd277c8452dbaea944305151614b83f78ba1bbb475e9079708c35c3d06cf04863734614935fcf251af1ebabcb9dc584add0399dcc88f868abe10716a13883daffdf2cd6e4a78d4ed905841607dd81f6d2ccc4b550def838ebd63071d95bd04503acff1223954a772b242c31d22314ae7e9193cd48b7f234b9928f141b94660ed3010adf827c5d51ac5d636d9d02122dafc1417e6d67ddb6b4a29d2a2c24ded78f62fb5ca1d10a62d83d6b6c959e7c9c93f06538ca5c4c85cea9cae306db1c917b7d912d9ee8a5e415b417e958e7eb6df6387500ec9f29d036a8f4980527bb2430988fcdd1b05aa6173975a528e391b23cfc5cffb67828a6969f65f1b0ab7e7f13844087080900dbc562f6e1c17ffad6832a1a96eab262a606071abc2e26abd82896355f89d0791a8ecac33b363ed84774a35cc85b7ef89c39e455112c216c5a481c75ee8e7de09a40dda6c8690da40068b1da5cadedd4ee66e9724e6743a4db48414cf962cf6b65303cfdfba7a28262fb4e8dd10be4a494f091524ab3d832b7d61c9449c83d4429172a31bb3b8695f65e45f1f6845783a8703826d3342077a834efb0161d9383701c4712895e9fbf4969c532bcc7908a2ec3dfd68e0bfde727da6d7ba288aa8258acee115b29c96823e4e5ddcdfb56a40797454c557b6960bd8148148fc1157b698163ee38581499ab01f749fb85c40ebb88bb250dc4d320a007594e14a976adcdcaa6301a0290f6a9e0fddd6f66db0350bdcfd44f901f5b95990b542bfeb575086ad9"}, 0x1015, 0x3) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000540)='./file0\x00', &(0x7f0000000600)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 1008.054291] validate_nla: 8 callbacks suppressed [ 1008.054300] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1008.066848] kobject: 'loop2' (00000000a5db2155): kobject_uevent_env [ 1008.071733] overlayfs: './file0' not a directory [ 1008.078060] kobject: 'loop2' (00000000a5db2155): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1008.091130] overlayfs: failed to resolve './file1-Xs^l˦=q4jd(gdks0ߌIсz gh2lbcXIf': -2 20:16:42 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f776572607ac50fadb53046d5f0eabc9c2b124b646972012e2f66696c65312c776f726b6469723d2e2f66696c6531e4c5a0bf3be5d5b6ce25d549b5b47de59d960b99fe8fa79cc0a8f2cd1883d0267aaea21db0e3bc831f670f9b8a46dc81dfc156f66f85bcbd3634d5e5db654c8a4661dc0a6ca3d29245bcb8cdcba8a166a366bd02f6382153f650dd903dd78e4081c7735bb52a5f4ceb634133ebb599"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) lsetxattr$security_ima(&(0x7f0000000240)='.\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@ng={0x4, 0xe, "99c890a0f015cc79d4e1bd"}, 0xd, 0x2) chdir(&(0x7f0000000280)='./file0\x00') lsetxattr$security_ima(&(0x7f0000000100)='./file1\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000440)=@v2={0x7, 0x0, 0xf, 0x9, 0x6f, "5dd554e120f7d6f9655dde0a40396bcca60a258c6fd7df2a43d9883bc109d246ee9f1b6721345e58492a348384f7f50a9bcd5581e3e8ad0eb4214ab5d5827bca4e4f9151e8794dd0d0752b265f6bbb7707d08a59d69bbdae77a4a86ef5a4e3e71112c98d8c44d44bc73765ef08caa0"}, 0x79, 0x2) r2 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x8447, 0x0) read(r2, &(0x7f0000000340)=""/138, 0x8a) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000300)={0x9800000000000000, 0x0, 0x9, 0x7, 0x5}) truncate(&(0x7f00000004c0)='./file0\x00', 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) 20:16:42 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xffff8000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1008.132738] overlayfs: './file0' not a directory 20:16:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$VIDIOC_ENUMAUDOUT(r1, 0xc0345642, &(0x7f00000001c0)={0x401, "664719ee391aef76f3199c8da8f937a766f527b6fb03fe49cdfb4469a966b0b3", 0x2, 0x1}) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000002c0), 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) [ 1008.170397] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1008.183607] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1008.209916] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env 20:16:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$NBD_DO_IT(r0, 0xab03) mkdir(&(0x7f0000000140)='./file1\x00', 0x2) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') symlink(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 1008.229188] overlayfs: unrecognized mount option "lower`z0F꼜+Kdir./file1" or missing value [ 1008.242870] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1008.267251] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' 20:16:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xffffff85}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1008.267935] overlayfs: unrecognized mount option "lower`z0F꼜+Kdir./file1" or missing value [ 1008.300322] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1008.320244] overlayfs: failed to resolve './file1Wqn': -2 [ 1008.328724] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1008.350001] overlayfs: failed to resolve './file1Wqn': -2 [ 1008.358121] overlayfs: './file0' not a directory [ 1008.364684] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1008.371218] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1008.386238] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1008.392772] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1008.402980] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1008.409834] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1008.420114] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1008.426806] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1008.474893] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1008.481345] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:16:43 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00`\x00'}, 0x1c) 20:16:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:43 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000000c0), &(0x7f0000000200)=0x4) mount$overlay(0x400000, &(0x7f0000000100)='./file1/file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xffffff9c}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) utime(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x9}) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f00000002c0)={&(0x7f0000000200)='./file1/file0/file0\x00', r1}, 0x10) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000400)='security.ima\x00', &(0x7f00000004c0)=@sha1={0x1, "227126712a7b570cc01805d4b82c377c8d51cd0e"}, 0x15, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x5ff, 0x0) [ 1008.960028] kobject: 'loop2' (00000000a5db2155): kobject_uevent_env [ 1008.977863] kobject: 'loop2' (00000000a5db2155): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1008.988318] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1009.000966] overlayfs: './file0' not a directory 20:16:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xffffff9f}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:43 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c6531adeda60e7e7158"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 1009.011646] overlayfs: './file0' not a directory [ 1009.027567] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1009.037922] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' 20:16:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f0000000400)='./file1\x00', 0xb) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000480)='./file1/file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f00000002c0), &(0x7f0000000300)=0xc) rename(&(0x7f0000000180)='./file1/../file0\x00', &(0x7f0000000280)='./file1/file0\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) 20:16:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") pipe2(&(0x7f00000002c0)={0xffffffffffffffff}, 0x84000) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f0000000300)=0x7ff, 0x4) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r2 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) uselib(&(0x7f0000000480)='./file0\x00') getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f00000004c0)={0x0, 0x75, "8a8c3dd66fa2edfbd769295ee9fb126412e662c13a4f634b08e52a1b9fb21b43a342acfd4007c92e0ddc80844c08177941a62b83345059b10b43be9439c69f865bf28c83ab4ac7365ad64ade419ed47a9df013e14485e5860edb2297e46f63ea6105b396f56b06b1cca83b33b8bf9d8a9ac498c2de"}, &(0x7f0000000540)=0x7d) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f0000000580)={r3, 0x9314}, 0x8) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') setsockopt$inet_opts(r2, 0x0, 0x4, &(0x7f00000003c0)="648b9e7119e008e4148f33c548f7529ddb0a1ee4f3f83a19100b34cc6937ba3ab05c5a167cd600d3bcd430bcce5a2a3e7bb09643e549a16560d5450e8bf20e3b3de839b3309a1478d94dbd249456905467209fa0f7a1c378c0004c2c5619ce2a254ac1bdb74a02e93e77805e4c2c364be3002aff3c113c65b0d518fac262dac92d626967a1e79820c1b7536a", 0x8c) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:43 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 1009.088390] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1009.099325] overlayfs: failed to resolve './file1~qX': -2 [ 1009.107169] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1009.121735] overlayfs: failed to resolve './file1~qX': -2 20:16:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xffffffe4}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1009.141836] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env [ 1009.161988] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1009.183401] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1009.209160] overlayfs: './file0' not a directory [ 1009.218942] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1009.245378] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1009.265039] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1009.277926] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1009.287970] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1009.294597] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1009.307066] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1009.314431] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1009.324491] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1009.330923] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' 20:16:44 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000000fc00"}, 0x1c) 20:16:44 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000080)='./file1\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:44 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x1000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:44 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000140)='./file1\x00', 0x3) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x10000, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000080)={0x2, 0x6, 0x2, 0x14, 0x4, 0x5, 0x476, 0x0, 0x4, 0x1}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000400)='./file2\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000300)='./file1\x00', &(0x7f00000002c0)='security.ima\x00', &(0x7f0000000280)=@v2={0x0, 0x3, 0xf, 0x8, 0x25, "d1fc13575e522a349697390e9ae19dcd564691080e9e97c9a94397817b88ce5f76f4dfa793"}, 0xfffffffffffffc7d, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) socket$rxrpc(0x21, 0x2, 0x2) 20:16:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x20000, 0x0) ioctl$KVM_SET_TSC_KHZ(r1, 0xaea2, 0x3) ioctl(r0, 0xfffffffffffff3f1, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c00302c6c6f77656b6469723d2e2f66fe6c653100000000000000000000000000000000"]) r2 = syz_open_dev$sndpcmc(&(0x7f0000000500)='/dev/snd/pcmC#D#c\x00', 0xcf6, 0x0) accept$unix(r2, &(0x7f0000000540)=@abs, &(0x7f00000005c0)=0x6e) r3 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f00000003c0)={0x0, 0x58, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0x401, @ipv4={[], [], @empty}, 0x676}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e20, 0x0, @mcast1, 0x3}, @in={0x2, 0x4e23, @remote}]}, &(0x7f0000000400)=0x10) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000440)={r4, 0x3d, "602b8478344fc4d457308424f3f4ef4b2887e2bad39155df19e95a0e6aaa93335e51145cccdb16399d8c4af459c981c6ec5ab9bce549efda6ad8c28a64"}, &(0x7f00000004c0)=0x45) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f0000000640)='./file1\x00', 0x3, 0x124) [ 1009.866428] kobject: 'loop2' (00000000a5db2155): kobject_uevent_env [ 1009.872896] kobject: 'loop2' (00000000a5db2155): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1009.911002] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1009.922436] overlayfs: './file0' not a directory [ 1009.943070] overlayfs: missing 'lowerdir' [ 1009.951133] overlayfs: filesystem on './file0' not supported as upperdir 20:16:44 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x10000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:44 executing program 4: openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x4, &(0x7f00000001c0)=ANY=[]) creat(&(0x7f0000000100)='./file1\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:44 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) uselib(&(0x7f00000002c0)='./file0\x00') chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:44 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x40000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1009.976845] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1009.993136] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' 20:16:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 1010.038094] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env [ 1010.045986] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1010.087201] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1010.102003] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1010.118321] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1010.135013] overlayfs: missing 'lowerdir' [ 1010.144286] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1010.151951] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1010.160006] overlayfs: missing 'lowerdir' [ 1010.162302] overlayfs: './file0' not a directory [ 1010.171363] overlayfs: './file0' not a directory [ 1010.185488] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1010.208540] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1010.220819] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env [ 1010.229612] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1010.241198] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1010.247904] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1010.285360] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1010.291836] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:16:45 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000000000300"}, 0x1c) 20:16:45 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x80ffff00000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:45 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[]) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f00000000c0)='./file1\x00') mount(&(0x7f0000000080)=ANY=[@ANYBLOB="2f64659fdb5bb09f9acf3b"], &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x42, 0x0) fsync(r0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setxattr$security_smack_entry(&(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)='security.SMACK64MMAP\x00', &(0x7f0000000300)=',ppp1md5sum\x00', 0xc, 0x3) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) r1 = socket$inet6(0xa, 0x5, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'lo\x00\x00\x00\x00\x01\xff\xf3\x00', 0x0}) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000001940)) ioctl$sock_SIOCGIFINDEX(r1, 0x8923, &(0x7f0000000380)={'bpq0\x00\v\x00\x00\x00\x00\x00\x00\x00\xfa\xff\x00', r3}) syz_mount_image$iso9660(0x0, 0x0, 0x3, 0x1, &(0x7f00000002c0)=[{0x0}], 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'bpq0\x00', 0x1211}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r4 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) accept(r4, 0x0, &(0x7f0000000440)) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) utimensat(r4, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={{}, {0x0, 0x2710}}, 0x100) 20:16:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000480)={&(0x7f0000000300), 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x30, r2, 0x0, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x48000}, 0x40) link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000002c0)={0x17, 0x14, 0x1, 0x1d, 0x4, 0x0, 0x5, 0x1, 0x1}) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 1010.753405] kobject: 'loop2' (00000000a5db2155): kobject_uevent_env [ 1010.783903] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1010.786804] kobject: 'loop2' (00000000a5db2155): fill_kobj_path: path = '/devices/virtual/block/loop2' 20:16:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 1010.792164] overlayfs: missing 'lowerdir' 20:16:45 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x100000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1010.840800] overlayfs: './file0' not a directory [ 1010.846509] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env [ 1010.861424] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1010.864403] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1010.881124] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:16:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x40000, 0x0) ioctl$DRM_IOCTL_GET_STATS(r1, 0x80f86406, &(0x7f00000003c0)=""/162) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdGr=./file:,lowerdir=./fime1,workdir=./f2le1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000002c0)='./file1/file0/file0\x00', 0x0, 0x0) [ 1010.885935] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1010.900854] overlayfs: missing 'lowerdir' [ 1010.909158] kobject: 'bpq0' (00000000abe11d2e): kobject_add_internal: parent: 'net', set: 'devices' 20:16:45 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000100)={0x5a, 0x7fe0000000000, 0x1}) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 1010.947385] kobject: 'bpq0' (00000000abe11d2e): kobject_uevent_env [ 1010.965028] kobject: 'bpq0' (00000000abe11d2e): fill_kobj_path: path = '/devices/virtual/net/bpq0' [ 1010.979474] kobject: 'queues' (00000000d12e628f): kobject_add_internal: parent: 'bpq0', set: '' [ 1010.990996] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1010.997151] kobject: 'queues' (00000000d12e628f): kobject_uevent_env [ 1010.999325] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1011.012568] kobject: 'queues' (00000000d12e628f): kobject_uevent_env: filter function caused the event to drop! [ 1011.025580] kobject: 'rx-0' (000000006e78bada): kobject_add_internal: parent: 'queues', set: 'queues' [ 1011.037320] kobject: 'rx-0' (000000006e78bada): kobject_uevent_env [ 1011.042075] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1011.047967] kobject: 'rx-0' (000000006e78bada): fill_kobj_path: path = '/devices/virtual/net/bpq0/queues/rx-0' [ 1011.055036] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1011.071317] kobject: 'tx-0' (0000000029d78b39): kobject_add_internal: parent: 'queues', set: 'queues' [ 1011.084907] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1011.097497] overlayfs: unrecognized mount option "upperdGr=./file:" or missing value [ 1011.105620] kobject: 'tx-0' (0000000029d78b39): kobject_uevent_env [ 1011.117416] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1011.125458] kobject: 'tx-0' (0000000029d78b39): fill_kobj_path: path = '/devices/virtual/net/bpq0/queues/tx-0' [ 1011.135411] overlayfs: './file0' not a directory 20:16:45 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 1011.146170] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1011.181022] overlayfs: unrecognized mount option "upperdGr=./file:" or missing value [ 1011.191401] : renamed from bpq0 [ 1011.195448] kobject: 'bpq0' (00000000abe11d2e): fill_kobj_path: path = '/devices/virtual/net/bpq0' [ 1011.200820] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env [ 1011.204710] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1011.215645] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1011.234647] kobject: '' (00000000abe11d2e): kobject_uevent_env [ 1011.241533] kobject: '' (00000000abe11d2e): fill_kobj_path: path = '/devices/virtual/net/' [ 1011.250486] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1011.263873] overlayfs: './file0' not a directory [ 1011.273728] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1011.297066] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1011.325073] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1011.343564] kobject: 'rx-0' (000000006e78bada): kobject_cleanup, parent 00000000d12e628f [ 1011.346174] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1011.359010] kobject: 'rx-0' (000000006e78bada): auto cleanup 'remove' event [ 1011.366515] kobject: 'rx-0' (000000006e78bada): kobject_uevent_env [ 1011.366989] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1011.372958] kobject: 'rx-0' (000000006e78bada): fill_kobj_path: path = '/devices/virtual/net//queues/rx-0' [ 1011.390813] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env [ 1011.397494] kobject: 'rx-0' (000000006e78bada): auto cleanup kobject_del [ 1011.400403] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1011.405523] kobject: 'rx-0' (000000006e78bada): calling ktype release [ 1011.405529] kobject: 'rx-0': free name [ 1011.405576] kobject: 'tx-0' (0000000029d78b39): kobject_cleanup, parent 00000000d12e628f [ 1011.405584] kobject: 'tx-0' (0000000029d78b39): auto cleanup 'remove' event [ 1011.405592] kobject: 'tx-0' (0000000029d78b39): kobject_uevent_env [ 1011.405618] kobject: 'tx-0' (0000000029d78b39): fill_kobj_path: path = '/devices/virtual/net//queues/tx-0' [ 1011.424682] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1011.433372] kobject: 'tx-0' (0000000029d78b39): auto cleanup kobject_del [ 1011.448522] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1011.462806] kobject: 'tx-0' (0000000029d78b39): calling ktype release [ 1011.487120] kobject: 'tx-0': free name [ 1011.491022] kobject: 'queues' (00000000d12e628f): kobject_cleanup, parent (null) [ 1011.499494] kobject: 'queues' (00000000d12e628f): calling ktype release [ 1011.506279] kobject: 'queues' (00000000d12e628f): kset_release [ 1011.512243] kobject: 'queues': free name [ 1011.516745] kobject: '' (00000000abe11d2e): kobject_uevent_env [ 1011.522813] kobject: '' (00000000abe11d2e): fill_kobj_path: path = '/devices/virtual/net/' [ 1011.583330] kobject: '' (00000000abe11d2e): kobject_cleanup, parent (null) [ 1011.591372] kobject: '' (00000000abe11d2e): calling ktype release [ 1011.597774] kobject: '': free name 20:16:46 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000000000500"}, 0x1c) 20:16:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x200000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:46 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowMrdir=./file1,workdir=./file1']) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U+', 0x51eb}, 0x28, 0x3) 20:16:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:46 executing program 1: r0 = accept4(0xffffffffffffffff, &(0x7f0000000480)=@hci, &(0x7f0000000500)=0x80, 0x800) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000540), &(0x7f0000000580)=0x4) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) lsetxattr$trusted_overlay_origin(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='trusted.overlay.origin\x00', &(0x7f0000000640)='y\x00', 0x2, 0x3) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000440)={r1, &(0x7f00000002c0)="2cb3b9488ed17febafa1a517dc70d28b02b206b0aa28969174fcda54e90f1b31c0b2c26774005b8f8a1a0e478cc50513bbe90f16ec39a81af2dd9e003112cc2c414819b80e98dd0df1ee205fa5f247aeaea7b5dc114b22b71440b151b28a0922c0ca7c2d8b3ee2885b7e7e7b4d491f4b9fd443ecaa31394bcfefb7", &(0x7f00000003c0)=""/101}, 0x18) creat(&(0x7f0000000680)='./file1\x00', 0x20) 20:16:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000200)=0x100000000, 0x2) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 1011.625670] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1011.632141] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1011.698185] kobject: 'loop2' (00000000a5db2155): kobject_uevent_env [ 1011.709516] kobject: 'loop2' (00000000a5db2155): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1011.727910] overlayfs: unrecognized mount option "lowMrdir=./file1" or missing value 20:16:46 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000b80000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) [ 1011.742975] overlayfs: unrecognized mount option "lowMrdir=./file1" or missing value [ 1011.754845] audit: type=1804 audit(1549397806.487:152): pid=7557 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir977161907/syzkaller.R27WR8/248/file0/file1" dev="overlay" ino=160504 res=1 [ 1011.782813] overlayfs: './file0' not a directory [ 1011.783143] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env 20:16:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x300000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:46 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r0 = open(&(0x7f0000000080)='./file1\x00', 0x842, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000100)=0x1) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 1011.799969] overlayfs: './file0' not a directory [ 1011.816895] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' 20:16:46 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x210000, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80400000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x3c, r2, 0x324, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x4) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 1011.830378] audit: type=1804 audit(1549397806.537:153): pid=7569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir977161907/syzkaller.R27WR8/248/file0/file1" dev="overlay" ino=160504 res=1 [ 1011.849646] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env 20:16:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x400001000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = syz_open_dev$vcsa(&(0x7f00000002c0)='/dev/vcsa#\x00', 0x7fff, 0x20000) getsockopt$inet6_int(r1, 0x29, 0x51, &(0x7f0000000300), &(0x7f00000003c0)=0x4) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) [ 1011.893546] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1011.918425] audit: type=1804 audit(1549397806.537:154): pid=7569 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir977161907/syzkaller.R27WR8/248/file0/file1" dev="overlay" ino=160504 res=1 20:16:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x400000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1011.929069] overlayfs: './file0' not a directory [ 1011.954938] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1011.976096] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1012.013630] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env [ 1012.027781] overlayfs: './file0' not a directory [ 1012.035629] overlayfs: './file0' not a directory [ 1012.038543] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1012.054113] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1012.060816] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1012.130157] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1012.136698] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:16:47 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr="000000000600"}, 0x1c) 20:16:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:47 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="75707065726469723d2e2f6469723d2e2f666f6c6531ac776f726b6469723d2e2f66696c653176509b6ea61f11c4ef5acc66b715dc13f5f64d2a9c3e480a96f50ca46482730000000000000000000000"]) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x400, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000240)={0x0, @empty, @initdev}, &(0x7f0000000380)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000003c0)={@rand_addr="07a1045d189638a5525a5be4601b6ae2", 0x67, r1}) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:47 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x500000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000400)='./file2\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./nile1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x80000, 0x0) openat$cgroup_ro(r1, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 1012.613623] kobject: 'loop2' (00000000a5db2155): kobject_uevent_env [ 1012.616916] overlayfs: failed to resolve './file1': -2 [ 1012.620140] kobject: 'loop2' (00000000a5db2155): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1012.636262] overlayfs: missing 'lowerdir' 20:16:47 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x600000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) [ 1012.669536] overlayfs: missing 'lowerdir' [ 1012.687184] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env [ 1012.690819] overlayfs: failed to resolve './file1': -2 [ 1012.702172] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' 20:16:47 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0xfffffffffffffff9) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) link(&(0x7f0000000080)='./file1/file0\x00', &(0x7f0000000100)='./file0\x00') chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) [ 1012.717903] overlayfs: './file0' not a directory [ 1012.736312] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1012.758801] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' 20:16:47 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') mkdir(&(0x7f00000002c0)='./file1/file0\x00', 0x87) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) rmdir(&(0x7f0000000200)='./file1/file0\x00') mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='\bpperdir=./file0,lowerdir=./file1,workdir=./file1']) r1 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x4, 0x4000) syz_open_dev$radio(&(0x7f00000003c0)='/dev/radio#\x00', 0x0, 0x2) r2 = socket(0x1, 0x3, 0x40000000000000) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000300)=0x10000000000006, 0xfffffffffffffd14) r3 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000440)={'caif0\x00', 0x400}) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, &(0x7f0000000400)={0x101, 0x9, 0x0, 0x9}, 0x10) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 1012.794960] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1012.816685] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1012.866039] overlayfs: './file0' not a directory [ 1012.879898] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1012.891775] overlayfs: './file0' not a directory [ 1012.912297] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1012.922877] overlayfs: unrecognized mount option "pperdir=./file0" or missing value [ 1012.960077] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env [ 1012.979635] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 1013.013786] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1013.020234] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1013.059039] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1013.074982] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' 20:16:48 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\a\x00'}, 0x1c) 20:16:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x700000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 20:16:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:48 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x8001, 0x80142) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in6, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={&(0x7f0000000100), 0xc, &(0x7f00000004c0)={&(0x7f0000000380)=@delqdisc={0x114, 0x25, 0x200, 0x70bd28, 0x25dfdbfb, {0x0, r1, {}, {0xfff2, 0xfff7}, {0xc, 0x4}}, [@TCA_STAB={0x8c, 0x8, [@TCA_STAB_DATA={0x10, 0x2, [0x7, 0x5, 0x2, 0x8, 0x7]}, @TCA_STAB_BASE={0x1c, 0x1, {0x401, 0x10001, 0xffffffff, 0x1, 0x3, 0x80000000, 0x8, 0x9}}, @TCA_STAB_BASE={0x1c, 0x1, {0x2, 0x1000, 0x401, 0x0, 0x0, 0x3, 0x5, 0x7}}, @TCA_STAB_BASE={0x1c, 0x1, {0xfffffffffffffff7, 0x1, 0x800, 0x80, 0x1, 0x7, 0x81, 0x4}}, @TCA_STAB_DATA={0xc, 0x2, [0x40, 0x5a3, 0x9, 0x1]}, @TCA_STAB_DATA={0x18, 0x2, [0xaa8, 0x0, 0x2, 0xfffffffffffffffc, 0x1, 0x6, 0x8, 0x8001, 0x7, 0x7f]}]}, @TCA_RATE={0x8, 0x5, {0x7, 0x6b}}, @TCA_STAB={0x38, 0x8, [@TCA_STAB_DATA={0x18, 0x2, [0x3ff, 0x400, 0x7f, 0x3, 0x3, 0xffff, 0x1, 0x4, 0x80, 0x6]}, @TCA_STAB_BASE={0x1c, 0x1, {0x4, 0x8, 0x8, 0x7f, 0x0, 0x4186, 0x7f, 0x2}}]}, @TCA_RATE={0x8, 0x5, {0x5}}, @qdisc_kind_options=@q_pfifo_head_drop={{0x14, 0x1, 'pfifo_head_drop\x00'}, {0x8, 0x2, 0xffffffffffffffc0}}]}, 0x114}, 0x1, 0x0, 0x0, 0x80}, 0x4040040) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f00000001c0)='./file1/file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) 20:16:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) r1 = syz_open_dev$mouse(&(0x7f00000002c0)='/dev/input/mouse#\x00', 0x7, 0x2000) ioctl$CAPI_GET_ERRCODE(r1, 0x80024321, &(0x7f0000000300)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f00000003c0)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2fff076c65312c776f726b6469723d2e2f66696c6531"]) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 1013.524446] kobject: 'loop2' (00000000a5db2155): kobject_uevent_env [ 1013.530938] kobject: 'loop2' (00000000a5db2155): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 1013.544067] validate_nla: 6 callbacks suppressed [ 1013.544076] netlink: 'syz-executor0': attribute type 4 has an invalid length. 20:16:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x800000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1013.578110] overlayfs: failed to resolve './le1': -2 [ 1013.593656] overlayfs: filesystem on './file0' not supported as upperdir 20:16:48 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) 20:16:48 executing program 4: mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x20000, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000100)={0x5, 0x1eb7, 0x4}) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') truncate(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$security_ima(&(0x7f00000001c0)='./file1/file0\x00', &(0x7f0000000200)='security.ima\x00', &(0x7f0000000240)=@ng={0x4, 0x14, "63d409966e28b360138d6ed05a"}, 0xf, 0x3) [ 1013.622169] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1013.631223] overlayfs: './file0' not a directory [ 1013.638437] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' 20:16:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000440)='./file1/file0\x00', 0x38) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x600, 0x0) [ 1013.680340] kobject: 'loop0' (00000000fd0df3a7): kobject_uevent_env [ 1013.695803] kobject: 'loop0' (00000000fd0df3a7): fill_kobj_path: path = '/devices/virtual/block/loop0' 20:16:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1']) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') link(&(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='./file1\x00') lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file1/file0\x00', 0x0, 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f0000000040)='./file1\x00', &(0x7f0000000300)='security.ima\x00', &(0x7f00000002c0)=@md5={0x1, "0007da2316c6b330546c072cad966876"}, 0x11, 0x0) open$dir(&(0x7f00000001c0)='./file1\x00', 0x0, 0x0) 20:16:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x9, 0x4, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0xa00000000000000}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x2, 0x1, 0x14}]}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) [ 1013.724256] netlink: 'syz-executor0': attribute type 4 has an invalid length. [ 1013.752091] kobject: 'loop5' (000000002b9dfc0e): kobject_uevent_env [ 1013.781480] kobject: 'loop5' (000000002b9dfc0e): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 1013.797085] overlayfs: './file0' not a directory [ 1013.806738] kobject: 'loop4' (0000000023d9a193): kobject_uevent_env [ 1013.813182] kobject: 'loop4' (0000000023d9a193): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 1013.822829] overlayfs: './file0' not a directory [ 1013.844048] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1013.850485] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 1013.870826] kobject: 'loop3' (00000000c0cf009e): kobject_uevent_env [ 1013.878682] kobject: 'loop3' (00000000c0cf009e): fill_kobj_path: path = '/devices/virtual/block/loop3' 20:16:49 executing program 2: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000000100)="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", 0x118) connect$inet6(r0, &(0x7f0000aacfe4)={0xa, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\t\x00'}, 0x1c) 20:16:49 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000100)="fc0000001a000700ab092500090007000aab0700000000001d00369321000400ff0100000005d0000000ff0000039815fa2c1ec28656aaa79bb94b46fe000000bc00020000000000000000270400117c22ebc205214000000000008934d07302ade01720d7d5bbc91a3e3280772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c83170e5bba4a46d284a710af333ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d42dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48a99c03f080548deac270e33429fd3000175e63fb8d38a87", 0xfc) 20:16:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000140)='./file1\x00', 0x0) r1 = getuid() syz_mount_image$gfs2(&(0x7f00000007c0)='gfs2\x00', &(0x7f0000000800)='./file1\x00', 0xa397, 0x7, &(0x7f0000000b00)=[{&(0x7f0000000840)="c28d889e28727174bc856942bce06c91e35a0f8039232b89a8737de739e92128", 0x20, 0x2}, {&(0x7f0000000880)="96e672", 0x3, 0x5}, {&(0x7f00000008c0)="2faab720e920aa176fc4e30f9da75c87e43ef84e1e88258feadaf1e1bab951f467c3133e34c67d52082be8b9951374b1facd55601cf10ec578389c5f16fbe208c7018bae730ae071f12569358572cb8af76c5d882834153719203bdf4a53a104052d57a1febfaea5a7e24da579fe285f9cc37fa0f62cd8c5aebb5542707993ee56a7aa803995e1b7dc04178bb967", 0x8e, 0x7}, {&(0x7f0000000980), 0x0, 0xfffffffffffffff7}, {&(0x7f00000009c0)="35129d76c819ea37778e6731498a00356402ee3f2ceeabeaf63ff5232aeb332c9a02c8696541c49f3baaed275cdb523b2d56f9b8d370753842394f52e0bffdf86361f000aa51facc85626b62a7e588d4546d4f46d230d07be823eb711ecf4edc0fb2d0aac5212ee42c8688fa874b065e49039643da3c35d0830e6af1e0573fb456472757843c5943f1b2a999bccb69c51571b856b2853f86ccec783b348f", 0x9e, 0x3}, {&(0x7f0000000c80)="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